23.2 C
Byron Shire
December 9, 2023

Spyware unplugged – New software attacks cast a light on cybersecurity

Latest News

High risk vehicles to be stopped and checked for fire ants at NSW Qld border

The detection of Red Imported Fire Ants at South Murwillumbah has seen a quick response from the Department of Primary Industries who have now started their next wave of operation in response. 

Other News

Artisanal cheeses from Nimbin Valley

Paul Wilson is telling me about their new chilli garlic halloumi and how it’s ‘fantastic over summer served with a green paw-paw salad,’ and my imagination is fired. It’s a rare thing for this hinterland business – around for some 17 years now, Paul and Kerry at the helm – to introduce a new cheese as ‘we try to stay focused on traditionally hand-made cheeses.’ And their stable of 12 – best sellers the Nashua washed rind and Tintenbar triple cream – include both cow and goat milk cheeses.

The parking problem

From Suffolk Park to Brunswick Heads, from Bangalow to Mullumbimby, parking is a big issue for residents and visitors...

Thalidomide apology recognises injustice

Last week, Labor PM, Anthony Albanese, delivered a national apology to all Australians impacted by the thalidomide tragedy.

Council looks to repair Mullum’s old Scout Hall

The Byron Shire Council is looking to retain a community asset, Mullumbimby's old Scout Hall, after being flood-damaged and in need of repairs.

Vale Pam Sonia

Very sadly, local treasure Pam Sonia passed away in Ewingsdale, last Wednesday, December 6. 

Beach driving  Ballina

Last week’s Ballina Shire Council (BSC) ordinary meeting (23 November) reviewed recreational four-wheel drive (4WD) access for Seven Mile...

Brought to you by The Echo and Cosmos Magazine

A major investigation conducted by news organisations has found that governments around the world may have been spied on by a malicious software called Pegasus.

The software was developed by an Israeli company, NSO Group, and sold to government clients, but the spyware that came with it may have targeted journalists, politicians, government officials and human rights activists.

It infected phones when a link in a specially crafted SMS was clicked. This downloaded spyware and rooted or jailbroke the device to install the software. These override the security on the phone, so that remote access is granted, making private information viewable even if you don’t have the device in your hand.

This means somebody else has access to all sorts of information, such as emails, messages, photos, locations, contacts and browsing history.

What is spyware?

For the most part, spyware is something that is downloaded without consent, and it doesn’t make itself explicitly known like ransomware and other malicious software sometimes do.

‘Spyware differs from other applications because it is generally installed without the knowledge of the device owner, it tracks and reports owner usage, locations and activities without the knowledge of the owner, and it usually operates in the background and surreptitiously without its processes or activities being visible to the owner of the compromised device,’ says Dennis ‘Darknet’ Desmond, a lecturer in cybersecurity at the University of the Sunshine Coast, Queensland.

‘Unlike most apps, the installer is usually not the owner of the device, and the installation of the app often occurs remotely through a hostile email, text or web link, remote connection, or through direct handling of the device.’

What is the point of spyware?

The whole point of this type of software is in its name – it’s used to spy on people. This can be for malevolent or security purposes, depending on who uses it and how it is used.

‘Spyware is designed to track the location, communications, activities and capture content from a compromised device,’ says Desmond.

‘Traditionally, spyware has been used both by stalkers – disaffected or abusive spouses and partners – and by nation-state agencies and entities desiring to track persons of interest.’

Spyware is also used for purposes of safety and national security because theoretically the information can sometimes be used not to exploit, but to keep people safe.

‘Compromising a device for the collection of communications and even interactions with others is extremely valuable to a nation-state intending to track and collect intelligence – criminal or national security – against a target,’ says Desmond.

‘The spyware allows for a comprehensive collection of all of the relevant information, including text messages, photographs, emails and phone conversations.’

Desmond points out that there are more innocuous uses for spyware, such as when it’s used by parents to track the activities of their children, or used to track and record activities of adults who may suffer from cognitive impairment.

‘Spyware allows a carer to track and locate the individual, prevent scams and fraud, and to monitor purchasing and communications activities. In these cases, the activity is beneficial,’ he says.

Unlike other tracking devices, spyware attaches to everyday items that are commonly carried and hold a lot of personal information.

‘Spyware is easier to use than a tracking device on a vehicle as it is always with the target,’ says Desmond. ‘The typical challenge is gaining access to the phone, tablet or computer.

‘The most successful attack is one where the attacker gets the victim to install the spyware through a malicious link or social engineering.

‘Spyware on personal devices also has the ability to collect passwords, financial data and important personal information.’

Is it legal?

It is hard to regulate spyware, because it depends strongly on its use. Only specific uses of spyware are legal, and that varies state-to-state and country-to-country. Some forms of spyware use are considered a breach of privacy, and others are considered necessary and/or acceptable.

‘Parents tracking children, or carers tracking adults with cognitive issues, generally have full authorisation,’ says Desmond.

‘However, in other cases, the use of these software applications can be considered violations of privacy, illegal wiretapping, and unauthorised access to a device or the communications of an individual.’

What is being done about it?

Cyberattacks, some of which involve spyware, are notoriously difficult to navigate because technology constantly evolves, resulting in a technological arms race between attackers and cybersecurity experts.

‘Defending against cyberattacks and cyber threats is an unconventional war that never ends and has no stop or break,’ says Diep Nguyen, a cybersecurity specialist at the University of Technology Sydney.

‘The attacking and defending happens every day. For example, you can find the statistics about daily attacks on Australia.

‘That is why we need to run updates on our systems frequently to patch known vulnerabilities and risks.’

So, what can ordinary citizens do about it? There are many small ways we can keep ourselves safe, and Nguyen’s an advocate of learning: ’Emphasise education of citizens on general cybersecurity and privacy awareness so that each citizen can become the first defender to protect ourselves in the cyberspace.’

Desmond adds that ’certain anti-malware apps have the ability to identify and stop spyware from operating on a device.

‘For personal devices, it is useful to periodically run anti-malware software to review what processes on the device.

‘If someone is concerned they are being tracked, they can have their device reviewed and evaluated by a cybersecurity professional or organisation specifically designed to perform that function.

‘It may also be a simple matter of resetting the device back to its original state, changing the phone number and SIM card on a phone, or buying a disposable phone – a so-called burner phone – with a pay-as-you-go feature to communicate more securely.’

Spyware and other forms of cybercrime aren’t new and they aren’t going to go away. Instead, they will continuously evolve at a fast pace. It’s therefore of the utmost importance for cybersecurity to continuously monitor and adapt to the situation.

‘With recent advances in AI that greatly empower both ‘attackers’ and ‘defenders’, risks/weak links/threats can be found and exploited faster,’ says Nguyen.

‘Additionally, with a large and growing number of devices, information technology systems become more vulnerable – for example, people from the other side of the Earth can hear our heartbeats and sense what happened in our bedrooms – if more appropriate solutions are not in place.’

♦ This article was written by Cosmos Magazine science journalist Dr Deborah Devis, who holds a PhD in plant genetics from the University of Adelaide. Read the original article.

Published by The Echo in conjunction with Cosmos Magazine.

Support The Echo

Keeping the community together and the community voice loud and clear is what The Echo is about. More than ever we need your help to keep this voice alive and thriving in the community.

Like all businesses we are struggling to keep food on the table of all our local and hard working journalists, artists, sales, delivery and drudges who keep the news coming out to you both in the newspaper and online. If you can spare a few dollars a week – or maybe more – we would appreciate all the support you are able to give to keep the voice of independent, local journalism alive.


  1. Yeah Nah! It’s much worse than this. Google, Apple and ISPs have given Government spy agencies open access to their data on us. From the search metadata, sites visited, history of files downloaded, recorded voice samples, and fingerprints, to social contacts and personal relationships. Even when your phone is in sleep mode or off, they can access the microphone if so desired. See Wikileaks and Snowden’s files – all they need is an email or phone number. Your intel computer also has a “Machine Engine OS before the OS” that can spy on us completely, bypassing our firewall, and our bandwidth monitors. This fine article is what’s known as a”limited hangout”. C’mon echonet, you can do better for my $10 per month!


Please enter your comment!
Please enter your name here

Kingscliff hosts largest triathlon since covid

Over 1,600 athletes were in Kingscliff over the weekend to participate in the largest triathlon since covid.

Vale Pam Sonia

Very sadly, local treasure Pam Sonia passed away in Ewingsdale, last Wednesday, December 6. 

Blue-green algae ‘amber alert’ at Lake Ainsworth

As the summer heats up there has been an increase in the blue-green algae at Lake Ainsworth near Lennox Head and an ‘amber alert' has been flagged by Ballina Shire Council.

Lismore to host National Junior Baseball competition

The biggest junior baseball competition in Australia, which is a feeder into the US World Series will be held in Lismore in May 2024.