‘Crisis’ OS X Trojan made by lawful intercept vendor, HackingTeam

Russian AV vendor Dr Web says the company behind it has a version for smartphones too.
  • Liam Tung (CSO Online)
  • — 27 July, 2012 07:48

Russian AV vendor Dr Web says the company behind it has a version for smartphones too.

Russian antivirus vendor Dr Web claims the OS X spy trojan dubbed ‘Crisis’, discovered this week, was crafted by Italian lawful intercept vendor HackingTeam.

Antivirus vendors Sophos (which calls it Morcut) and Dr Web (which calls it Backdoor.Davinci.1) released details about its functionality Thursday after Mac-focussed AV vendor Intego reported its discovery from the Virus Total database.  

Sophos and Dr Web describe a tool that allows its controllers to monitor mouse coordinates, several instant messenger apps, location, internal webcam, clipboard contents, key strokes, running applications, web URLs, screen shots, internal mic, calendar data and alerts, device information and address book contents. The malware is delivered as an archived Java applet.

Sophos security consultant Graham Cluley suggests it is the work of cyber-criminals in pursuit of money, however Dr Web claims the heavily equipped spy trojan was “developed and sold” by Italian vendor of ‘offensive security’ technologies HackingTeam.

HackingTeam, which has been in operation since 2003, claims to have sold its surveillance software to intelligence agencies in 30 countries across five continents, according to a 2011 analysis by the Guardian following the discovery of the German “federal” trojan employed by state police for surveillance activities. 

The company came under the spotlight after F-Secure researchers discovered Gamma International UK, a rival government surveillance security vendor that was found to have sold its FinFisher product to the Egyptian Government. 

“HackingTeam criminals call their brainchild a 21st-century weapon and sell Backdoor.Davinci.1 as a remote control and espionage solution. The Trojan poses a serious threat to users, because it not only intercepts any information on the infected computer but also gives criminals full control over a compromised system, so that they can render it non-operational, for example, by damaging or removing its components,” Dr Web reported Thursday.

CSO.com.au contacted Dr Web however the company had not responded to queries by the time of publishing. Sophos' Cluley told CSO.com.au he could not confirm the identity of the trojan's author.

It's unclear what evidence Dr Web has to make its claim, however if it is right, it has selected the most appropriate name from several that have emerged since its discovery.

F-Secure security researcher Mikko Hypponen seemed convinced that the trojan was indeed the work of the HackingTeam, pointing out it was "openly advertised" on the company's website.

HackingTeam promotes a “remote control system” that it calls Da Vinci, “The hacking suite for government interception”.

The company promises to deploy a secret agent that can “monitor a hundred thousand targets” via a “single easy to use interface”. The brochure suggests mobile platforms it can target include iOS, Android, Nokia’s S60, and BlackBerry OS.  

 

Financial services firms to increase cyber security budgets this year, PwC claims

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Deep Security - Enterprise Virtualization Security

Advanced protection for physical, virtual and cloud servers

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.