Grey Heron is a new cyber-arms dealer offering to sell hacking tools to governments; it is fronted by Eric Rabe, who previously represented the disgraced, hacked Italian malware company Hacking Team, notorious for selling spy tools to governments that used them to target dissidents who were tortured and murdered after they were outed.
Grey Heron's marketing materials, distributed at the no-press-allowed UK Security & Policing event, promises the ability to hack into messages sent over Signal and Telegram, two widely used secure messaging platforms.
Stapled to the marketing materials was a card for Eric Rabe, who is identified as "marketing and communication" for the company.
In the brochure, Grey Heron promises to solve the same sort of problem that other malware vendors point to: the proliferation of easy-to-use encryption, especially in consumer devices and services. A common way to circumvent end-to-end encryption is to target the end-point itself—the phone, the computer—to siphon messages before they are sent securely.
“Designed in the name of privacy, today’s communications network also provides a near perfect hiding place for the lawless. Criminals and terrorists can do their work without fear. No one can know who or even where they are,” the brochure reads.
Grey Heron’s malware can be deployed in a number of different ways, according to the brochure, including remotely via exploits, or social engineering attacks, likely by tricking a target into downloading the malicious piece of software. The company provides capabilities for Android and iOS devices, as well as OS X and Windows computers.
Government Malware Company 'Grey Heron' Advertises Signal, Telegram Spyware [Joseph Cox/Motherboard]
Fingerprint locks are catastrophically awful, part LXVII: the software security on the crowdfunded Tapplock "is basically nonexistent" -- the lock broadcasts its own unlock code over Bluetooth, and if you send it back to the lock, it pops open.
A team of computer scientists, psychologists and neuroscientists used eye-tracking and fMRI to measure how users perceived security warnings, such as warnings about app permissions and browser warnings about insecure pages and plugin installations.
Konrad Rieck has data-mined the nine top security conferences, compiling a decade-by-decade list of the papers most often cited in the presentations delivered at these events: top of the pile is Random Oracles are Practical: A Paradigm for Designing Efficient Protocols (Sci-Hub mirror), from the 1993 ACM Conference on Computer and Communications Security. Rieck has […]
Your pet might be photogenic, but getting them to stare long enough at your camera to snap that Instagram-worthy photo isn’t as simple as telling them to sit. Bribing your pets with their favorite treat, however, might just do the trick, and with the Adjustable Pet Selfie Smartphone Attachment, you can do just that while getting […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]
The human eye is a powerful thing, but it’s not so great at seeing in the dark or around tight spaces, which is partially why most of us struggle with unplugging drains, cleaning under the fridge, and other hard-to-reach jobs. This 1080p HD Waterproof WiFi Wireless Endoscopic Camera, however, gives you the flexibility necessary to get […]