Not only hackers that take advantage of malware, government agencies also use it. As the German government is using it for the needs of surveillance (surveillance).
Allegations of the use of malware as a 'soldier' in the world of cyberspace surveillance by the German government came in a report released last October 8 by the European hacker group, Chaos Computer Club (CCC). Bundestrojaner malware known as Trojan becomes the tool or the Federal German Police work in carrying out their duties primarily related to reconnaissance duties.
Bundestrojan somewhat different from the trojan is also used by other countries, namely Egypt, which uses trojans FinFisher, and France are using spyware. Different from the case in France and Egypt, Malware Bundestrojaner (DLL and its driver system) actually published by the CCC, and demanded the German Government to discontinue the use of malware spying on people because of the constitutional court has imposed the ban since February 27, 2008.
Researchers at cyber security firm ESET, identify the malware as Win32/R2D2.A. The Trojan displays a tapper and able to take screenshots and record sounds, this capability could potentially widen further than Wiretapping functions allowed by the court.
Some applications that will be affected and subject to spying, among others, Skype, MSN Messenger, Yahoo Messenger, and X-Lite - a VoIP application. Furthermore, the malware also creates a backdoor on the infected computer, so the trojan can send all information available to the controller computer.
Another is the ability to download other malware that can be run in the system. This is not much different from the usual backdoor trojan that we encounter everyday.
Yudhi Strong, Technical Consultant of ESET Prosperita Indonesia argues, from where the malware originated in the context of detection, not too important to be known. Because, if the malicious code contained in it, then there is no reason for antimalware to not detect it.
"The main strength of behavior analysis methods and heuristics are used ESET principle is anyone sending software, and for whatever its consumer, if found any malicious code in it, it will be detected," he explained through information received detikINET, Thursday (27/10/2011) .
Responding to this, David Harley, researcher of malware intelligence at ESET mentions in some cases, action to plant spy software on the computer a person who is suspected should be done with the consent of the government.
"But in many countries this still is not allowed, except in special situations, eg for the investigation of crime or the need for national security," he said.
In conclusion, this problem still save a lot of questions and could be a double-edged sword. For the government, how it can support the performance of law enforcement and security. But on the other side will catch all the antivirus software with a charge of malicious code.
Tidak ada komentar:
Posting Komentar