18.7 C
Byron Shire
September 21, 2021

Spyware unplugged – New software attacks cast a light on cybersecurity

Latest News

10pm Monday – update of COVID venues of concern

The Northern NSW Local Health District has been notified of a number of venues of concern associated with confirmed cases of COVID-19 in the region.

Other News

Goonellabah drive-thru COVID testing this weekend at GSAC

With the community in lockdown, Lismore City Council says it is important for to get tested for COVID-19, even if you only have the mildest of symptoms. 

New COVID venues of concern Lismore and Coraki

Following a second case being identified in Lismore, that is no longer in the area, several more COVID contact venues have been identified.

Police arrest 32 in protests across the state

Police say they have prevented the mass gathering of people in various locations across NSW, arresting 32 people and issuing 265 Penalty Infringement Notices in a coordinated and mobile response to planned protest activity.

The year 2000

I must answer David Heilpern. Remember 2000, how the computers were all to fail on NYE? How could so...

Update: Abandoned vessel, Burleigh Heads – owner found

Police are seeking urgent public assistance to help identify and locate the owner of a seemingly abandoned vessel.

Byron’s vaccination level one of the lowest in NSW

The Byron Shire has one of the lowest COVID-19 vaccination levels in the state, according to Federal Government figures, suggesting that a significant proportion of the community may be reluctant to get the jab.

Brought to you by The Echo and Cosmos Magazine


A major investigation conducted by news organisations has found that governments around the world may have been spied on by a malicious software called Pegasus.

The software was developed by an Israeli company, NSO Group, and sold to government clients, but the spyware that came with it may have targeted journalists, politicians, government officials and human rights activists.

It infected phones when a link in a specially crafted SMS was clicked. This downloaded spyware and rooted or jailbroke the device to install the software. These override the security on the phone, so that remote access is granted, making private information viewable even if you don’t have the device in your hand.

This means somebody else has access to all sorts of information, such as emails, messages, photos, locations, contacts and browsing history.

What is spyware?

For the most part, spyware is something that is downloaded without consent, and it doesn’t make itself explicitly known like ransomware and other malicious software sometimes do.

‘Spyware differs from other applications because it is generally installed without the knowledge of the device owner, it tracks and reports owner usage, locations and activities without the knowledge of the owner, and it usually operates in the background and surreptitiously without its processes or activities being visible to the owner of the compromised device,’ says Dennis ‘Darknet’ Desmond, a lecturer in cybersecurity at the University of the Sunshine Coast, Queensland.

‘Unlike most apps, the installer is usually not the owner of the device, and the installation of the app often occurs remotely through a hostile email, text or web link, remote connection, or through direct handling of the device.’

What is the point of spyware?

The whole point of this type of software is in its name – it’s used to spy on people. This can be for malevolent or security purposes, depending on who uses it and how it is used.

‘Spyware is designed to track the location, communications, activities and capture content from a compromised device,’ says Desmond.

‘Traditionally, spyware has been used both by stalkers – disaffected or abusive spouses and partners – and by nation-state agencies and entities desiring to track persons of interest.’

Spyware is also used for purposes of safety and national security because theoretically the information can sometimes be used not to exploit, but to keep people safe.

‘Compromising a device for the collection of communications and even interactions with others is extremely valuable to a nation-state intending to track and collect intelligence – criminal or national security – against a target,’ says Desmond.

‘The spyware allows for a comprehensive collection of all of the relevant information, including text messages, photographs, emails and phone conversations.’

Desmond points out that there are more innocuous uses for spyware, such as when it’s used by parents to track the activities of their children, or used to track and record activities of adults who may suffer from cognitive impairment.

‘Spyware allows a carer to track and locate the individual, prevent scams and fraud, and to monitor purchasing and communications activities. In these cases, the activity is beneficial,’ he says.

Unlike other tracking devices, spyware attaches to everyday items that are commonly carried and hold a lot of personal information.

‘Spyware is easier to use than a tracking device on a vehicle as it is always with the target,’ says Desmond. ‘The typical challenge is gaining access to the phone, tablet or computer.

‘The most successful attack is one where the attacker gets the victim to install the spyware through a malicious link or social engineering.

‘Spyware on personal devices also has the ability to collect passwords, financial data and important personal information.’

Is it legal?

It is hard to regulate spyware, because it depends strongly on its use. Only specific uses of spyware are legal, and that varies state-to-state and country-to-country. Some forms of spyware use are considered a breach of privacy, and others are considered necessary and/or acceptable.

‘Parents tracking children, or carers tracking adults with cognitive issues, generally have full authorisation,’ says Desmond.

‘However, in other cases, the use of these software applications can be considered violations of privacy, illegal wiretapping, and unauthorised access to a device or the communications of an individual.’

What is being done about it?

Cyberattacks, some of which involve spyware, are notoriously difficult to navigate because technology constantly evolves, resulting in a technological arms race between attackers and cybersecurity experts.

‘Defending against cyberattacks and cyber threats is an unconventional war that never ends and has no stop or break,’ says Diep Nguyen, a cybersecurity specialist at the University of Technology Sydney.

‘The attacking and defending happens every day. For example, you can find the statistics about daily attacks on Australia.

‘That is why we need to run updates on our systems frequently to patch known vulnerabilities and risks.’

So, what can ordinary citizens do about it? There are many small ways we can keep ourselves safe, and Nguyen’s an advocate of learning: ’Emphasise education of citizens on general cybersecurity and privacy awareness so that each citizen can become the first defender to protect ourselves in the cyberspace.’

Desmond adds that ’certain anti-malware apps have the ability to identify and stop spyware from operating on a device.

‘For personal devices, it is useful to periodically run anti-malware software to review what processes on the device.

‘If someone is concerned they are being tracked, they can have their device reviewed and evaluated by a cybersecurity professional or organisation specifically designed to perform that function.

‘It may also be a simple matter of resetting the device back to its original state, changing the phone number and SIM card on a phone, or buying a disposable phone – a so-called burner phone – with a pay-as-you-go feature to communicate more securely.’

Spyware and other forms of cybercrime aren’t new and they aren’t going to go away. Instead, they will continuously evolve at a fast pace. It’s therefore of the utmost importance for cybersecurity to continuously monitor and adapt to the situation.

‘With recent advances in AI that greatly empower both ‘attackers’ and ‘defenders’, risks/weak links/threats can be found and exploited faster,’ says Nguyen.

‘Additionally, with a large and growing number of devices, information technology systems become more vulnerable – for example, people from the other side of the Earth can hear our heartbeats and sense what happened in our bedrooms – if more appropriate solutions are not in place.’

♦ This article was written by Cosmos Magazine science journalist Dr Deborah Devis, who holds a PhD in plant genetics from the University of Adelaide. Read the original article.

Published by The Echo in conjunction with Cosmos Magazine.


Support The Echo

Keeping the community together and the community voice loud and clear is what The Echo is about. More than ever we need your help to keep this voice alive and thriving in the community.

Like all businesses we are struggling to keep food on the table of all our local and hard working journalists, artists, sales, delivery and drudges who keep the news coming out to you both in the newspaper and online. If you can spare a few dollars a week – or maybe more – we would appreciate all the support you are able to give to keep the voice of independent, local journalism alive.

1 COMMENT

  1. Yeah Nah! It’s much worse than this. Google, Apple and ISPs have given Government spy agencies open access to their data on us. From the search metadata, sites visited, history of files downloaded, recorded voice samples, and fingerprints, to social contacts and personal relationships. Even when your phone is in sleep mode or off, they can access the microphone if so desired. See Wikileaks and Snowden’s files – all they need is an email or phone number. Your intel computer also has a “Machine Engine OS before the OS” that can spy on us completely, bypassing our firewall, and our bandwidth monitors. This fine article is what’s known as a”limited hangout”. C’mon echonet, you can do better for my $10 per month!

LEAVE A REPLY

Please enter your comment!
Please enter your name here

A new COVID-19 case flies into the Far North Coast

The Northern NSW Local Health District has confirmed that there is a new case of COVID-19 in Northern NSW today, and they will be included in NSW Health’s official reporting tomorrow.

Found – Have you seen Steve? Missing person

Mullumbimby man Steve Mustchin went missing at 11am this morning from Byron Bay Hospital and his family are asking locals to keep an eye out for him.

Images released of men who robbed the Byron Bowlo

Detectives investigating the armed robbery of a licensed premises in Byron Bay earlier this year, have released CCTV images and are appealing for public information that may assist their inquiries.

New Nesbitt Park mountain bike skills course in Lismore

Though Lismore is currently in lockdown, the city has inaugurated a new sporting activity in Nesbitt Park that will make residents want to enjoy outdoors as soon as possible.