Analyzing an Off-the-Shelf Surveillance Software: Hacking Team Case Study

Varování

Publikace nespadá pod Ekonomicko-správní fakultu, ale pod Ústav výpočetní techniky. Oficiální stránka publikace je na webu muni.cz.
Autoři

ŠPAČEK Stanislav ČELEDA Pavel DRAŠAR Martin VIZVÁRY Martin

Rok publikování 2017
Druh Článek ve sborníku
Konference SPI 2017 - Security and Protection of Information 2017
Fakulta / Pracoviště MU

Ústav výpočetní techniky

Citace
www https://is.muni.cz/repo/1382042/2017-SPI-hacking-team-case-study-paper.pdf
Obor Informatika
Klíčová slova Hacking Team; Remote Control System; KYPO Cyber Range; Advanced Persistent Threat; Malware Builder Kit
Přiložené soubory
Popis In July 2015, a major distributor and developer of covert surveillance tools, Italian company Hacking Team, has been hacked. Due to the attack, nearly 400 GB of internal data leaked on sharing networks. The data contained the latest version of the surveillance software named Galileo, including full technical and user documentation. We use this opportunity to examine key features of surveillance software that was designed for governmental agencies and its specification was kept secret. In this paper, we deploy the system in an isolated virtual environment and test its behavior during a surveillance operation. We use collected information to classify the advancement level of Galileo among similar mass-spread malware and the advanced persistent threats tools. With the hindsight of nearly two years, it is also possible to evaluate the impact the data leak had.
Související projekty:

Používáte starou verzi internetového prohlížeče. Doporučujeme aktualizovat Váš prohlížeč na nejnovější verzi.