{"id":6282,"date":"2014-10-09T13:28:53","date_gmt":"2014-10-09T17:28:53","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=6282"},"modified":"2025-07-10T05:56:25","modified_gmt":"2025-07-09T18:56:25","slug":"legal-malware-counteraction","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/legal-malware-counteraction\/6282\/","title":{"rendered":"Legal malware and cyber-mercenaries"},"content":{"rendered":"<p>We are living in a fascinating time where PCs and networks are becoming increasingly integrated in our everyday lives. Only a short time ago they were taking over offices and production facilities, then they entered our living rooms and kitchens, and today almost everyone on the planet carries a moderately powerful connected PC right in their pocket. We are now entering a beautiful era of the Internet of Things where almost everything will be connected.<\/p>\n<p>The more we entrust our everyday routines to computers, the more attractive they become for those that love digging into others\u2019 secrets\u2014bad guys (cybercriminals) and good guys (law enforcement officials who use hacking tactics for justified reasons) alike.<\/p>\n<p>If we ignore their presumably contrary motivations, there is another interesting feature that we can use to tell them apart: Hacking and espionage are hardly crimes for the secret service, but instead are a part of their everyday work.<\/p>\n<p><strong>The phenomenon of legal malware <\/strong><\/p>\n<p>A key trend in today\u2019s world of cybercriminal business is the legalization of cybercrime, which is positioned differently in the infosec market. For instance, <a href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2012\/03\/21\/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees\/\" target=\"_blank\" rel=\"noopener nofollow\">selling zero day vulnerabilities<\/a> (i.e. vulnerabilities with no security solutions put in place) is becoming increasingly prominent.<\/p>\n<div class=\"pullquote\">The legalization of cybercrime is becoming a trend in the world of cybercriminal business.<\/div>\n<p>Now anyone (those that can afford certain vulnerabilities that can have more than five zeros on the price tag) can purchase an exploit and use it when appropriate\u2014ideally, when protecting their assets, but practically, for almost anything. The trading of such vulnerabilities can be compared to the missile or sophisticated explosives trade.<\/p>\n<p>Furthermore, some companies offer full-feature software bundles that can infiltrate networks and, after obtaining control of the victim\u2019s PC, monitor their activities. We have talked about the highest-end spying Trojan \u2013 well, this case can be compared to selling fully packed VFs.<\/p>\n<div id=\"attachment_6284\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/10\/06042425\/FinFisher-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6284\" class=\"wp-image-6284\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/10\/06042425\/FinFisher-1.jpg\" alt=\"FinFisher-1\" width=\"600\" height=\"207\"><\/a><p id=\"caption-attachment-6284\" class=\"wp-caption-text\">The Banner of FinFisher advertises their perfectly legal means of intrusion and remote monitoring.<\/p><\/div>\n<p style=\"text-align: left\">Companies offering such services range from the largest defense industry conglomerates reporting to governments, to modestly sized independent companies.<\/p>\n<p>\u00a0The latter would not, of course, sell malware to anyone, but their customer list is much more diverse: beyond secret service organizations, it includes major corporations. The services of such \u2018mercenaries\u2019 are actively purchased by third-world governments like Pakistan and Nigeria.<\/p>\n<div id=\"attachment_6286\" style=\"width: 186px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6286\" class=\"wp-image-6286 size-medium\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2014\/10\/06042423\/hacking-team-123-176x300.png\" alt=\"hacking-team-123\" width=\"176\" height=\"300\"><p id=\"caption-attachment-6286\" class=\"wp-caption-text\">Galileo is powered by Hacking Team- another legal developer for cyber espionage<\/p><\/div>\n<p>Also, it is important to note that the actual buyer of cyber-espionage services is not necessarily the formal one: there was a case in which surveillance and filtering solutions were sold to the UAE but ended up in embargoed Syria.<\/p>\n<p>One way or another, Kaspersky Lab\u2019s experience proves that privately developed legal malware could potentially end up not only in the \u2018good\u2019 hands of secret service (how good they actually are is not the main topic of this article), but also in the hands of very pragmatic third parties. In other words, even if you\u2019re are not at all relevant to the criminal world or the political realm, and are just an ordinary person, one of these days you could find yourself in the midst of it all.<\/p>\n<p><strong>How dangerous is it?<\/strong><\/p>\n<p>Significantly. Malware like this is created for those with a very generous budget. It is at a very advanced level that has nothing to do with teenage misbehaviors or petty criminals trying to steal a hundred bucks from your credit card.<\/p>\n<p>Some insights from the developers of such malware that slipped on Wikileaks, state that a traditional antivirus does not pose even the tiniest threat to their products.<\/p>\n<p>The developers of legal malware use a great deal of advanced technologies in their products that can fool a virus analyst and prevent him from looking under the hood.<\/p>\n<p><strong>What can be done about it?<\/strong><\/p>\n<p>Practices do prove that such technologies do have their limitations: There is no magic allowing one to break stealthily into any system but, rather, it is a sample of an usual malware.<\/p>\n<p>Consequently, that means heuristic algorithms (a method of detection based on searching for suspicious attributes relevant to malware) employed in Kaspersky Lab\u2019s solutions are very likely able to filtrate the workings of cyber-mercenaries.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Kaspersky heuristics are able to successfully catch creative mercenaries<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FU3hK&amp;text=Kaspersky+heuristics+are+able+to+successfully+catch+creative+mercenaries\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>For example, our research of products by <a href=\"https:\/\/threatpost.com\/eu-petition-seeks-to-restrict-export-of-digital-arms\/102763\" target=\"_blank\" rel=\"noopener nofollow\">FinFisher<\/a> (one of the most prominent players in the legal cyber-weapon market) proved that contrary to FinFisher\u2019s statement, heuristic analyzers that are deployed in our products as of Kaspersky Antivirus 6 (MP4), have successfully dealt with such threats.<\/p>\n<p>That means that one has to resort to <a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\">an antivirus<\/a> that employs a set of technologies that can battle highly sophisticated threats, considering the high likelihood that some dubious \u2018anti-cybercriminal\u2019 tool could end up in wrong hands.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacking and espionage are hardly crimes for the secret service, but rather are a part of their everyday work. But imagine what could happen if their tools end up in wrong hands. <\/p>\n","protected":false},"author":345,"featured_media":6283,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2646],"tags":[282,36,193,43,192,97],"class_list":{"0":"post-6282","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-cybersecurity","9":"tag-malware-2","10":"tag-mobile-device","11":"tag-privacy","12":"tag-protection","13":"tag-security-2"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/legal-malware-counteraction\/6282\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/legal-malware-counteraction\/4225\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/legal-malware-counteraction\/4130\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/legal-malware-counteraction\/4655\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/legal-malware-counteraction\/4883\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/legal-malware-counteraction\/5539\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/legal-malware-counteraction\/6282\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/legal-malware-counteraction\/5099\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/legal-malware-counteraction\/5539\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/legal-malware-counteraction\/6282\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/6282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/345"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=6282"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/6282\/revisions"}],"predecessor-version":[{"id":26531,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/6282\/revisions\/26531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/6283"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=6282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=6282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=6282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}