Mac spyware found at Oslo Freedom Forum
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
(Publication) Google search: [1]
Mac spyware found at Oslo Freedom Forum | |
---|---|
Botnet | HangOver |
Malware | Kitmos |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-05-16 |
Editor/Conference | F-Secure |
Link | http://www.f-secure.com/weblog/archives/00002554.html (Archive copy) |
Author | Sean Sullivan |
Type | Blogpost |
Abstract
“ The Oslo Freedom Forum is an annual event "exploring how best to challenge authoritarianism and promote free and open societies." This year's conference (which took place May 13-15) had a workshop for freedom of speech activists on how to secure their devices against government monitoring. During the workshop, Jacob Appelbaum actually discovered a new and previously unknown backdoor on an African activist's Mac.
Our Mac analyst (Brod) is currently investigating the sample.
It's signed with an Apple Developer ID.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1332, editor = {F-Secure}, author = {Sean Sullivan}, title = {Mac spyware found at Oslo Freedom Forum}, date = {16}, month = May, year = {2013}, howpublished = {\url{http://www.f-secure.com/weblog/archives/00002554.html}}, }