Russian "Kaspersky Lab has found malicious Trojans for iOS and Android. Downloadable user-spyware application is able to monitor the users and pass the villains data about them.
An application called Galileo, created by the Italian firm HackingTeam, is freely available, but users are hardly aware of its additional "features". Spyware application for phones constantly monitors the owners gadgets, sends the creators photos, GEODATA and records audio files. Application-spy exists for iOS and Android.
"We have found such implement applications for all major operating systems, even Android and iPhone. It is able to track user activity, even his maneuvers with the help of the GPS chip in the phone, send photo with a camera phone and maintain multiple entry through his microphone," said a specialist on security issues Kaspersky Lab Sergey Golovanov.
According to reliable information "Laboratory"for potential users of the platform include 21 powers - such as Mexico, Poland, Turkey, Italy, UAE, Egypt, Azerbaijan, Uzbekistan, Kazakhstan and other Trojans especially vigorously infect the iPhone, and among the victims lot of reporters, politicians and public activists. "In the list of victims, which is located in the latest study, conducted jointly by Kaspersky Lab and the Citizen Lab, social activists, human rights defenders, reporters and political figures", - quoted experts RIA Novosti.
Experts managed to establish, that the "control center" platform and its servers are in more than 40 countries around the world, even in the USA, Canada, England, Kazakhstan and Ecuador. Today specialists can establish the existence of such 320 "centers". But, according to experts, the stay of such center does not mean that their use of local power structures. "And yet for the owners of these "center" it is important to place the servers in those States where they can be controlled, without fear grips and avoiding international legal risks", - noted in the "Laboratory".
Spyware characterize the mode of operation of a telephone performed on it operations and depending on that perform different functions. If the user changes the SIM card, the Trojan starts recording and sending it to the server of telephone conversations of the user. If the phone connects to the network for charging, the device can be given the command to record sounds or remove the setting built in cameras. The Trojan is able not only to determine the user's location of the phone, but also to send to an attacker's server calendar content, articles from the telephone, and to intercept SMS messages Viber, WhatsApp and Skype.
sections: Hi-Tech, Accidents |