Copies of anti-censorship software used in Iran and Syria contain keylogger

Green Simurgh copies distributed from file sharing websites contain a Trojan horse

Rogue copies of Green Simurgh, an Internet proxy software application used in Iran and Syria, have been found to contain malware that records users' activities and keystrokes.

Green Simurgh is an anti-censorship application that routes a computer's outbound connections to a server located in the U.S. This allows the software's users to bypass network filters and access Internet resources that would normally be banned by their ISP.

Green Simurgh doesn't require any installation and can run directly from USB memory sticks, which makes it suitable for users who access the Internet from cafes and public computers.

The software has been used in Iran since 2009 and, according to the Citizen Lab, a University of Toronto laboratory that researches digital media, global security and human rights, Syrian users have also began to rely on it.

"It has recently come to our attention that this software is being recommended and circulated among Syrian Internet users for bypassing censorship in their country," said Citizen Lab technical advisor Morgan Marquis-Boire in a blog post on Friday. "This information led to the discovery and analysis of a back-doored version of this software."

The malicious version is being distributed from file sharing websites like as a package called The archive contains an executable file that masquerades as a Green Simurgh installer.

When run on a Windows machine, the rogue installer drops a legitimate copy of the Green Simurgh software in the Program Files directory, but also installs a computer Trojan horse that runs in the background.

"[The Trojan horse] keeps a log of your username, machine name, every window clicked and keystroke entered," said Chester Wisniewski, a senior security advisor at antivirus vendor Sophos, in a blog post on Tuesday. "It attempts to submit these logs to some servers located in the United States, but registered to an entity that appears to be based in Saudi Arabia."

Considering that thousands of users depend on the legitimate Simurgh software, it's likely that a lot more people have been impacted by this malware than by Flame -- a recently discovered cyberespionage threat that has received a lot of attention in the media -- Wisniewski said.

"Unlike Flame, which is a highly targeted malware that has only been found on a handful of computers globally, this malware is targeting users for whom having their communications compromised could result in imprisonment or worse," he said.

The Green Simurgh developers have posted a warning on their website, urging users to only download the proxy software from the official download page and to verify the MD5 checksums of the package before running it. They also advised users who believe that they might have been infected with this malware to run an up-to-date antivirus scanner in order remove it from their computers.

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucian Constantin

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts