• Skip to content
  • Skip to primary sidebar

Information Security Expert Blog

Dr. Ali Jahangiri

Spy tools

Stuxnet: The Industrial Sabotage Mystery Deepens

November 16, 2010 By Ali Jahangiri

Since its discovery a few months ago, the purpose and intention of the Stuxnet worm has remained shrouded in mystery. This Windows based worm is the first ever malware designed to attack industrial equipment.

Specifically it targets Siemens’ Supervisory Control And Data Acquisition (SCADA) software used to control and monitor industrial processes and has the ability to reprogram Siemens’ Simatic PLCs (programmable logic controllers).

PLCs contain code to control automated industrial systems in manufacturing plants or factories. Programmers use the Siemens’ software from a Windows PC to create code and then upload their code to the PLCs. The Stuxnet worm infects the PCs and then uploads its own code to the PLC.

Read the full story here.

Filed Under: News, Rootkit, Spy tools, Spyware, Trojan Tagged With: analysis, industrial espionage, Malware, malware analysis, PLC, SCADA systems, Siemens, Stuxnet, Trojan, Vacon, Virus, Worm

Smart Phone Spyware and Cell Phone Surveillance Tools

July 27, 2010 By Ali Jahangiri

I have been studying cell phone related trojans and spyware since April 2010 and it is clear to me this will become an new area of focus for information security professionals. We all use smart phones as they make our lives easier and not just for phone calls, we are now using smart phones for almost everything.

A Smart phone is a perfect all-in-one gadget, it has GPS, Internet access, email and entertainment capabilities. As such we carry them with us almost always and use them based on the occasion or need.

Smart phones vary greatly in terms of design and operating systems. This has forced the Trojan coders to create spyware programs for selected operating systems only such as Symbian and Windows Mobile. In addition, there are many Trojans and spyware applications which only work on certain models and operating systems. The variety of mobile phone models and operating systems has, in some way, limited the distribution and infection rate by mobile phone related Trojans and spyware programs.

However a new threat is now emerging; surveillance and spying tools which utilize cell phone networks for malicious activities. These tools have been used worldwide by security agencies and private investigators for a long time.

But now these tools are available to the public. They are easy to order online and can be delivered directly by courier to your home or office. So now, beside smart phone Trojans and spyware applications there are new tools and devices which could be use for information gathering and reconnaissance by hackers or intruders.

In my studies I found the following product which could be used for malicious activities:

Disclaimer: The following texts and pictures have been copied from uspy.me website.

Design Features:

This SIM device is a special system designed for audio surveillance or monitor by providing regular mobilephone SIM services. It has a magnetized core which helps itself easily fixed on any hidden metal surface.

A unique design, small frame and sturdy construction encompass the rich SIM technology beneath it’s compact shell. Embed condense, sensitive microphone, which could pick up any ambient sound.

Functionality

When the need comes, or unforgettable moment occurs, just dial up the SIM number, it runs silently at any circumstance, and help you capture needed sound of its surrounding.

Its internal battery could provide 2~3 hours working time, with external extra battery, it is capable of constantly running up to 6~7 hours. It is a covert surveillance tool made for everyone.

Other features

  • Frequency: 900\1800\1900
  • Embed microphone, powerful sound receiving effect (Can receive sounds even 10 meters far away from the device)
  • 24 hours non-stop power supply
  • All GSM SIM card compatible
  • Stand-by time: 15 days

Filed Under: Smartphone, Spy tools, Spyware, Surveillance, Trojan Tagged With: analysis, Cell phone spy tool, Smart phone spyware

Primary Sidebar

Recent Posts

  • Simple PHP Shell Script
  • MasterCard Australia: Untrusted SSL Certificate
  • How to Test Snort with Penetration Testing Tools
  • WordPress NextGEN Gallery Plugin; Directory Browsing Vulnerability
  • Koobface Gangs Investigative Report

Archives

Categories

Links

  • My Facebook Page
  • My Website
  • Privacy

RSS From LiveHacking.com

  • Nmap 7 Released!
  • Apple fixes security vulnerabilities in Safari, OS X, iOS and Apple TV
  • The OpenSSL project releases new versions of its software to squash 12 security vulnerabilities
  • FREAK vulnerability weakens secure Web sites
  • WP-Slimstat vulnerability exposes WordPress websites to SQL injection attacks
  • Google backpedals on its arbitrary vulnerability disclosure policy
  • Cross Site Scripting vulnerability found in IE 11
  • Apple updates iOS, OS X and Apple TV in monster patch release
  • Google discloses three more zero-day vulnerabilities, this time for OS X
  • Microsoft to fix Windows vulnerability that Google publicly disclosed last week

. Copyright 2007 - 2013 Information Security Expert Blog . All Rights Reserved .