× Security Privacy Downloads of Popular Apps Were Silently Swapped For Spyware in Turkey: Citizen L

Discussion in 'malware problems & news' started by IvoShoen, Mar 9, 2018.

  1. IvoShoen

    IvoShoen Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    849
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    It is SOP in many Middle East countries for the gov. to intercept Internet communications. I know Saudi Arabia does it. This is the first I have heard of Turkey to it. But the guy in charge is getting increasingly dictatorial.

    Much much more detail on Middle East deep packet inspection using Sandvine here: https://citizenlab.ca/2018/03/bad-t...vices-deploy-government-spyware-turkey-syria/
     
    Last edited: Mar 9, 2018
  3. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    State-sponsored hacking is one good reason to use the Microsoft Store for your apps
    https://mspoweruser.com/state-spons...son-to-use-the-microsoft-store-for-your-apps/
     
  4. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Internet Provider Redirects Users in Turkey to Spyware: Report
    https://www.securityweek.com/internet-provider-redirects-users-turkey-spyware-report
     
  6. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,018
    Location:
    Member state of European Union
    But downloading apps from MS Store is probably secure (downloads from MS Store are probably signed, I guess). I hate to say it, but Windows S is probably protected against this particular attack. It would be interesting whether Chocolatey (3rd party package manager for Windows) is also properly protected by signed hashes.
    Packages for major Gnu/Linux distributions also check signed by distribution's developer team, so they are also protected against this specific attack, at least if somebody is using only packages from official repository. It is usually not enforced, but users are strongly urged to use only official repository for downloading packages.
     
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,606
    Location:
    The Netherlands
    I didn't completely understand. Did they get redirected to a fake downloading site, or did they click on legit download links and then got redirected to malware bundled with legit apps? Scary stuff, and it also shows why it's important to even monitor trusted apps during install. Would be interesting to know if the malware did operate as child processes of Avast and CCleaner.
     
  8. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Per the article I posted in reply #5, they got redirected at the ISP level i.e. Turk Telecom.
     
  9. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,606
    Location:
    The Netherlands
    That's too technical for me. But if I understood correctly, you will invisibly get directed to malware infested versions.
     
  10. guest

    guest Guest

    Burned malware returns, according to Cylance: is Hacking Team responsible?
    October 23, 2018
    https://www.cso.com.au/article/6486...says-cylance-report-hacking-team-responsible/
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.