text
stringlengths 4
429
|
---|
How Government-Grade Spy Tech Used A Fake Scandal |
2012, accessed: 12-November-2013. [Online]. Available: To Dupe Journalists, |
2012, accessed: 7-August-2013. |
http://bit.ly/1aSdw07 |
[78] A. Ornaghi, |
em-http-server, |
accessed: 27-February- |
[58] V. Silver, |
Spyware Leaves Trail to Beaten 2014. [Online]. Available: https://github.com/alor/em- |
Activist Through Microsoft Flaw, |
2012, ac- http-server |
cessed: 14-November-2013. [Online]. Available: |
[79] SophosLabs, |
Anatomy of a targeted attack |
http://bloom.bg/1ja2geI |
SophosLabs explores an Adobe zero-day |
malware |
[59] B. Hubbard, |
Emirates Balk at Activism in Region experiment |
2013, accessed 7-August-2013. [Online]. |
Hit by Uprisings, |
2013, accessed: 14-November-2013. Available: http://bit.ly/HQ1oRc |
[Online]. Available: http://nyti.ms/I4n2Aw |
[80] K. Zetter, |
American Gets Targeted by Digital |
[60] |
SPY NET, |
accessed: 27-February-2014. [Online]. Spy Tool Sold to Foreign Governments, |
2013, |
Available: http://newspynetrat.blogspot.com/ accessed: 14-November-2013. [Online]. Available: |
[61] |
Asprotect SKE, |
accessed: 27-February-2014. [Online]. http://wrd.cm/1fHonth |
Available: http://www.aspack.com/asprotect32.html [81] M. Marquis-Boire and B. Marczak, |
From Bahrain |
[62] |
Unpacking VBInject/VBCrypt/RunPE, |
2010, ac- With Love: FinFisher |
s Spy Kit Exposed? |
Jul. |
cessed: 7-August-2013. [Online]. Available: 2012, accessed: 4-August-2013. [Online]. Available: |
http://bit.ly/1e28nS2 http://bit.ly/1bngpB2 |
14 |
23rd USENIX Security Symposium |
USENIX Association |
A FinSpy fingerprints |
Previous work by Guarnieri on scanning for FinSpy servers |
found that in response to a request such as GET /, the |
Bahraini FinSpy C&C server returns a response with the string |
Hallo Steffi |
[67]. Guarnieri searched a database of |
such responses compiled by the Critical.IO Internet scanning |
project [68], locating 11 additional servers in 10 countries [67]. |
We refer to this fingerprint as |
1 . Concurrent with this ef- |
fort, we devised our own fingerprint |
1 that tested three as- |
pects of the handshake between a FinSpy infectee and a Fin- |
Spy C&C server, which follows a custom TLV-based protocol |
running on ports such as 22, 53, 80, and 443. We conducted |
targeted scanning of several countries using |
1 , and also con- |
firmed Guarnieri |
s findings for those servers still reachable af- |
ter he published his findings. |
We observed a trend: changes in HTTP response behavior |
by FinFisher after publication of findings about the software. |
In July 2012, for example, after a post about Bahraini FinSpy |
samples [81], servers closed the TCP connection in response |
to a GET / or HEAD / request (although servers continued |
to behave consistently with |
1 . Other changes followed later |
in 2012, including a new response to GET / requests that in- |
cluded an imperfect copy of an Apache server |
s HTTP response |
(the Date header used UTC rather than GMT). We fingerprinted |
this error as |
2 , and later in 2012 fingerprinted other distinctive |
behavior in response to GET / requests as |
Subsequent scans of /0 for |
2 and |
3 , and five service |
probes of the Internet Census for |
1 through |
3 , located several |
additional servers. In Feburary 2013 we identified and finger- |
printed new HTTP response behavior with |
4 and modified |
to produce |
2 , which tests only two of the three aspects of the |
FinSpy handshake (the third test of |
1 was broken when Fin- |
Spy servers were updated to accept types of invalid data they |
had previously rejected). |
As of 3/13/13, all servers that matched any |
fingerprint |
matched |
15 |
USENIX Association |
23rd USENIX Security Symposium |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.