17.6 C
Byron Shire
July 15, 2024

Spyware unplugged – New software attacks cast a light on cybersecurity

Latest News

Ballina mayor vies for second term ‘leading the rebuild’

Ballina Shire’s mayoral race this September looks to be a competition between two women, one progressive, the other conservative, after both candidates announced campaigns last week.

Other News

NSW Labor’s mental health reform aims to streamline agencies

Despite the presence of many high-quality services, the difficulties involved in navigating the mental health system as a whole can make seeking help a distressing experience rather than a therapeutic one.

Elections

As a 65 year-old man, it should be illegal for me to vote. Start at 18 finish at 65,...

Man assaulted – Tweed Heads South

Police have commenced an investigation following an assault at a Tweed Heads shopping centre yesterday afternoon.

Comp awards for Suffolk Tennis

Suffolk Park Tennis Tuesday adult social players celebrated their recent night competition season last Sunday at their sponsors Yulli’s. The...

Complex Palestinian issue

Many false ideas in Mr Heilpern’s article. But I would say this; hardly anybody is trying to understand the...

Let the BBSF fun begin!

The Byron Bay Surf Festival (BBSF) is just over a month away and they have a huge program for surfers and spectators from August 15-18.

Brought to you by The Echo and Cosmos Magazine


A major investigation conducted by news organisations has found that governments around the world may have been spied on by a malicious software called Pegasus.

The software was developed by an Israeli company, NSO Group, and sold to government clients, but the spyware that came with it may have targeted journalists, politicians, government officials and human rights activists.

It infected phones when a link in a specially crafted SMS was clicked. This downloaded spyware and rooted or jailbroke the device to install the software. These override the security on the phone, so that remote access is granted, making private information viewable even if you don’t have the device in your hand.

This means somebody else has access to all sorts of information, such as emails, messages, photos, locations, contacts and browsing history.

What is spyware?

For the most part, spyware is something that is downloaded without consent, and it doesn’t make itself explicitly known like ransomware and other malicious software sometimes do.

‘Spyware differs from other applications because it is generally installed without the knowledge of the device owner, it tracks and reports owner usage, locations and activities without the knowledge of the owner, and it usually operates in the background and surreptitiously without its processes or activities being visible to the owner of the compromised device,’ says Dennis ‘Darknet’ Desmond, a lecturer in cybersecurity at the University of the Sunshine Coast, Queensland.

‘Unlike most apps, the installer is usually not the owner of the device, and the installation of the app often occurs remotely through a hostile email, text or web link, remote connection, or through direct handling of the device.’

What is the point of spyware?

The whole point of this type of software is in its name – it’s used to spy on people. This can be for malevolent or security purposes, depending on who uses it and how it is used.

‘Spyware is designed to track the location, communications, activities and capture content from a compromised device,’ says Desmond.

‘Traditionally, spyware has been used both by stalkers – disaffected or abusive spouses and partners – and by nation-state agencies and entities desiring to track persons of interest.’

Spyware is also used for purposes of safety and national security because theoretically the information can sometimes be used not to exploit, but to keep people safe.

‘Compromising a device for the collection of communications and even interactions with others is extremely valuable to a nation-state intending to track and collect intelligence – criminal or national security – against a target,’ says Desmond.

‘The spyware allows for a comprehensive collection of all of the relevant information, including text messages, photographs, emails and phone conversations.’

Desmond points out that there are more innocuous uses for spyware, such as when it’s used by parents to track the activities of their children, or used to track and record activities of adults who may suffer from cognitive impairment.

‘Spyware allows a carer to track and locate the individual, prevent scams and fraud, and to monitor purchasing and communications activities. In these cases, the activity is beneficial,’ he says.

Unlike other tracking devices, spyware attaches to everyday items that are commonly carried and hold a lot of personal information.

‘Spyware is easier to use than a tracking device on a vehicle as it is always with the target,’ says Desmond. ‘The typical challenge is gaining access to the phone, tablet or computer.

‘The most successful attack is one where the attacker gets the victim to install the spyware through a malicious link or social engineering.

‘Spyware on personal devices also has the ability to collect passwords, financial data and important personal information.’

Is it legal?

It is hard to regulate spyware, because it depends strongly on its use. Only specific uses of spyware are legal, and that varies state-to-state and country-to-country. Some forms of spyware use are considered a breach of privacy, and others are considered necessary and/or acceptable.

‘Parents tracking children, or carers tracking adults with cognitive issues, generally have full authorisation,’ says Desmond.

‘However, in other cases, the use of these software applications can be considered violations of privacy, illegal wiretapping, and unauthorised access to a device or the communications of an individual.’

What is being done about it?

Cyberattacks, some of which involve spyware, are notoriously difficult to navigate because technology constantly evolves, resulting in a technological arms race between attackers and cybersecurity experts.

‘Defending against cyberattacks and cyber threats is an unconventional war that never ends and has no stop or break,’ says Diep Nguyen, a cybersecurity specialist at the University of Technology Sydney.

‘The attacking and defending happens every day. For example, you can find the statistics about daily attacks on Australia.

‘That is why we need to run updates on our systems frequently to patch known vulnerabilities and risks.’

So, what can ordinary citizens do about it? There are many small ways we can keep ourselves safe, and Nguyen’s an advocate of learning: ’Emphasise education of citizens on general cybersecurity and privacy awareness so that each citizen can become the first defender to protect ourselves in the cyberspace.’

Desmond adds that ’certain anti-malware apps have the ability to identify and stop spyware from operating on a device.

‘For personal devices, it is useful to periodically run anti-malware software to review what processes on the device.

‘If someone is concerned they are being tracked, they can have their device reviewed and evaluated by a cybersecurity professional or organisation specifically designed to perform that function.

‘It may also be a simple matter of resetting the device back to its original state, changing the phone number and SIM card on a phone, or buying a disposable phone – a so-called burner phone – with a pay-as-you-go feature to communicate more securely.’

Spyware and other forms of cybercrime aren’t new and they aren’t going to go away. Instead, they will continuously evolve at a fast pace. It’s therefore of the utmost importance for cybersecurity to continuously monitor and adapt to the situation.

‘With recent advances in AI that greatly empower both ‘attackers’ and ‘defenders’, risks/weak links/threats can be found and exploited faster,’ says Nguyen.

‘Additionally, with a large and growing number of devices, information technology systems become more vulnerable – for example, people from the other side of the Earth can hear our heartbeats and sense what happened in our bedrooms – if more appropriate solutions are not in place.’

♦ This article was written by Cosmos Magazine science journalist Dr Deborah Devis, who holds a PhD in plant genetics from the University of Adelaide. Read the original article.

Published by The Echo in conjunction with Cosmos Magazine.


Support The Echo

Keeping the community together and the community voice loud and clear is what The Echo is about. More than ever we need your help to keep this voice alive and thriving in the community.

Like all businesses we are struggling to keep food on the table of all our local and hard working journalists, artists, sales, delivery and drudges who keep the news coming out to you both in the newspaper and online. If you can spare a few dollars a week – or maybe more – we would appreciate all the support you are able to give to keep the voice of independent, local journalism alive.

1 COMMENT

  1. Yeah Nah! It’s much worse than this. Google, Apple and ISPs have given Government spy agencies open access to their data on us. From the search metadata, sites visited, history of files downloaded, recorded voice samples, and fingerprints, to social contacts and personal relationships. Even when your phone is in sleep mode or off, they can access the microphone if so desired. See Wikileaks and Snowden’s files – all they need is an email or phone number. Your intel computer also has a “Machine Engine OS before the OS” that can spy on us completely, bypassing our firewall, and our bandwidth monitors. This fine article is what’s known as a”limited hangout”. C’mon echonet, you can do better for my $10 per month!

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Tweed boating trip turns fatal

A boating venture on the Tweed River ended in tragedy on Saturday when the vessel capsized and a passenger died.

Two in hospital, including officer, after perilous arrest

A Northern Rivers man wanted for arrest and an officer trying to arrest him are both in hospital after a disastrous encounter in the early hours of the morning.

Federal Labor funds Mullum hospital site masterplan  

A $263,000 federal grant has been awarded to Byron Shire Council for a masterplan and development strategy for the former Mullumbimby Hospital site.

Paddle-out for innovative shaper, Geoff McCoy

There are shapers and there are shapers.  Geoff McCoy was our local eminent, and world-recognised, master surfboard shaper. I call this gaggle of exclusive surfboard...