Grey Heron is a new cyber-arms dealer offering to sell hacking tools to governments; it is fronted by Eric Rabe, who previously represented the disgraced, hacked Italian malware company Hacking Team, notorious for selling spy tools to governments that used them to target dissidents who were tortured and murdered after they were outed.
Grey Heron's marketing materials, distributed at the no-press-allowed UK Security & Policing event, promises the ability to hack into messages sent over Signal and Telegram, two widely used secure messaging platforms.
Stapled to the marketing materials was a card for Eric Rabe, who is identified as "marketing and communication" for the company.
In the brochure, Grey Heron promises to solve the same sort of problem that other malware vendors point to: the proliferation of easy-to-use encryption, especially in consumer devices and services. A common way to circumvent end-to-end encryption is to target the end-point itself—the phone, the computer—to siphon messages before they are sent securely.
“Designed in the name of privacy, today’s communications network also provides a near perfect hiding place for the lawless. Criminals and terrorists can do their work without fear. No one can know who or even where they are,” the brochure reads.
Grey Heron’s malware can be deployed in a number of different ways, according to the brochure, including remotely via exploits, or social engineering attacks, likely by tricking a target into downloading the malicious piece of software. The company provides capabilities for Android and iOS devices, as well as OS X and Windows computers.
Government Malware Company 'Grey Heron' Advertises Signal, Telegram Spyware [Joseph Cox/Motherboard]
A team of computer scientists, psychologists and neuroscientists used eye-tracking and fMRI to measure how users perceived security warnings, such as warnings about app permissions and browser warnings about insecure pages and plugin installations.
Konrad Rieck has data-mined the nine top security conferences, compiling a decade-by-decade list of the papers most often cited in the presentations delivered at these events: top of the pile is Random Oracles are Practical: A Paradigm for Designing Efficient Protocols (Sci-Hub mirror), from the 1993 ACM Conference on Computer and Communications Security. Rieck has […]
A former executive from the data-mining dark operator Cambridge Analytica ‘visited Julian Assange in February last year and told friends it was to discuss what happened during the US election,’ the Guardian reported today. Brittany Kaiser worked as a director there until not long ago, and is reported “to have channelled cryptocurrency payments and donations […]
The human eye is a powerful thing, but it’s not so great at seeing in the dark or around tight spaces, which is partially why most of us struggle with unplugging drains, cleaning under the fridge, and other hard-to-reach jobs. This 1080p HD Waterproof WiFi Wireless Endoscopic Camera, however, gives you the flexibility necessary to get […]
Macs are undeniably some of the most versatile computers on the market, but they can do so much more than what their stock apps allow. For those looking to get the most out of their Mac hardware, the Pay What You Want 2018 Super Mac Bundle features 10 of the industry’s top apps, including photo editors and […]
Salesforce has reinvented the way companies manage customer information, close deals, and ultimately drive revenue, so it should come as no surprise that it’s one of the more valuable skills you can list on your resume today. In fact, according to research from Burning Glass, this platform is now the 7th most in-demand software skill, beating out […]