Tysk regeringstrojan
3 inlägg
• Sida 1 av 1
Tysk regeringstrojan
Chaos Computer Club analyzes government malware
2011-10-08 19:00:00, admin
http://www.ccc.de/en/updates/2011/staatstrojaner
Minister bekräftar tysk regeringstrojan
2011-10-11 14:32 - Computer Sweden
http://www.idg.se/2.1085/1.409523/minis ... ingstrojan
2011-10-08 19:00:00, admin
The CCC analysis reveals functionality in the "Bundestrojaner light" (Bundestrojaner meaning "federal trojan" and is the colloquial German term for the original government malware concept) concealed as "Quellen-TKÜ" that go much further than to just observe and intercept internet based telecommunication, and thus violates the terms set by the constitutional court. The trojan can, for example, receive uploads of arbitrary programs from the Internet and execute them remotely. This means, an "upgrade path" from Quellen-TKÜ to the full Bundestrojaner's functionality is built-in right from the start. Activation of the computer's hardware like microphone or camera can be used for room surveillance.
But the trojan's built-in functions are scary enough, even without extending it by new moduls. For the analysis, the CCC wrote it's own control terminal software, that can be used to remotely control infected PCs over the internet. With its help it is possible to watch screenshots of the web browser on the infected PC – including private notices, emails or texts in web based cloud services.
Not only can unauthorized third parties assume control of the infected system, but even attackers of mediocre skill level can connect to the authorities, claim to be a specific instance of the trojan, and upload fake data. It is even conceivable that the law enforcement agencies's IT infrastructure could be attacked through this channel. The CCC has not yet performed a penetration test on the server side of the trojan infrastructure.
"We were surprised and shocked by the lack of even elementary security in the code. Any attacker could assume control of a computer infiltrated by the German law enforcement authorities", commented a speaker of the CCC. "The security level this trojan leaves the infected systems in is comparable to it setting all passwords to '1234'".
The CCC demands: The clandestine infiltration of IT systems by government agencies must stop. At the same time we would like to call on all hackers and people interested in technology to further analyze the malware, so that at least some benefit can be reaped from this embarrassing eavesdropping attempt. Also, we will gladly continue to receive copies of other versions of government malware off your hands.
http://www.ccc.de/en/updates/2011/staatstrojaner
Minister bekräftar tysk regeringstrojan
2011-10-11 14:32 - Computer Sweden
http://www.idg.se/2.1085/1.409523/minis ... ingstrojan
Re: Tysk regeringstrojan
Läste nånstans att tyska regeringen betalat 2 miljoner euro till företaget som utvecklat den.
Mer info: http://www.f-secure.com/weblog/archives/00002250.html
Mer info: http://www.f-secure.com/weblog/archives/00002250.html