Incident: Spyware Firm Impersonates NGOs to Hack Targets, Microsoft Disables Cyberweapons

Published Date: 2021-07-15

Postmortem Analysis
Timeline 1. The software failure incident involving the Israeli company linked to fake websites to hack targets happened around July 2021. [116806]
System The software failure incident described in the article involves the failure of the spyware developed and marketed by the Israeli company Candiru. Specifically, the spyware developed by Candiru failed in its intended purpose of infecting and monitoring computers and phones, leading to unauthorized access and surveillance of individuals targeted by the spyware. Therefore, the system that failed in this software failure incident is: 1. Spyware developed and marketed by Candiru [116806].
Responsible Organization 1. Candiru, a Tel Aviv-based firm marketing "untraceable" spyware that can infect and monitor computers and phones, was responsible for causing the software failure incident [116806].
Impacted Organization 1. Politicians 2. Human rights activists 3. Journalists 4. Academics 5. Embassy workers 6. Political dissidents [Citizen Lab, 116806]
Software Causes 1. The software failure incident was caused by the spyware developed and sold by Candiru, a Tel Aviv-based firm, which was used to infect and monitor computers and phones [116806]. 2. The spyware allegedly infected targets through web domains, with URLs masquerading as NGOs, women's rights advocates, activist groups, health organizations, and news media [116806]. 3. The spyware enabled the hacking and monitoring of individuals in civil society, including politicians, human rights activists, journalists, academics, embassy workers, and political dissidents [116806]. 4. The spyware allowed for the creation of fake websites impersonating high-profile activist groups and not-for-profit organizations to exploit users' computers and gain control silently [116806]. 5. The spyware could provide persistent access to victims' computers, potentially allowing governments to steal passwords, documents, and even spy on victims through their microphone [116806].
Non-software Causes 1. Lack of international safeguards or strong government export controls in the spyware industry [116806] 2. Systematic problems with the spyware industry and its regulation [116806]
Impacts 1. The software failure incident involving Candiru's spyware had devastating consequences for activists and dissidents, as seen in the case of Ahmed Mansoor, a human rights activist in the United Arab Emirates, who faced violence and imprisonment after being hacked and monitored through spyware purchased by the UAE [116806]. 2. The incident led to the hacking and monitoring of at least 100 targets, including politicians, human rights activists, journalists, academics, embassy workers, and political dissidents in various countries such as the UK, Palestine, Israel, Iran, Lebanon, Yemen, Spain, Turkey, Armenia, and Singapore [116806]. 3. The spyware enabled persistent access to victims' computers, potentially allowing governments to steal passwords, documents, and even turn on microphones to spy on the victims' surroundings without their knowledge [116806].
Preventions 1. Implementing strong international regulations and export controls on spyware vendors to prevent the misuse of surveillance technologies [116806]. 2. Conducting thorough background checks and due diligence on companies like Candiru before engaging in business relationships to ensure they adhere to ethical standards and legal practices [116806]. 3. Enhancing cybersecurity measures and awareness among potential targets, such as activists, journalists, and dissidents, to recognize and avoid phishing attempts and malicious links that could lead to spyware infections [116806].
Fixes 1. Implementing stronger government export controls on spyware vendors to prevent the abuse of surveillance technologies [116806]. 2. Enhancing international safeguards to regulate the mercenary spyware industry and prevent widespread abuse [116806]. 3. Conducting thorough investigations into spyware companies like Candiru to understand the industry better and track its growth [116806]. 4. Developing protections against malware and cyberweapons, such as issuing software updates like the one done by Microsoft to disable Candiru's "cyberweapons" [116806].
References 1. Researchers from the Citizen Lab at the University of Toronto [116806] 2. Microsoft [116806] 3. Bill Marczak, a co-author of the report [116806] 4. Ahmed Mansoor, a human rights activist in the United Arab Emirates [116806] 5. Forbes [116806] 6. Israeli newspaper [116806] 7. John Scott-Railton, a Citizen Lab researcher and co-author [116806]

Software Taxonomy of Faults

Category Option Rationale
Recurring unknown The articles do not provide information about a software failure incident happening again at the same organization or at multiple organizations.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the case of the Israeli company Candiru, which was linked to fake Black Lives Matter and Amnesty International websites used to hack targets. The firm marketed "untraceable" spyware that could infect and monitor computers and phones through web domains associated with URLs masquerading as NGOs, women's rights advocates, activist groups, health organizations, and news media [116806]. (b) The software failure incident related to the operation phase is evident in how the spyware developed by Candiru was used by governments to hack and monitor individuals in civil society. Microsoft found at least 100 targets of malware linked to Candiru, including politicians, human rights activists, journalists, academics, embassy workers, and political dissidents in various countries. The spyware enabled governments to steal passwords, documents, and even turn on a microphone to spy on victims' surroundings, highlighting the misuse of the system for surveillance purposes [116806].
Boundary (Internal/External) within_system, outside_system (a) within_system: - The software failure incident involving Candiru's spyware was primarily due to contributing factors that originated from within the system itself. Candiru, a secretive Israeli company, was linked to fake websites impersonating NGOs and activist groups to infect and monitor targets with their spyware [116806]. - Candiru's spyware allegedly infected targets through web domains associated with URLs masquerading as legitimate organizations, enabling the silent hijacking of control over victims' computers [116806]. - Microsoft conducted its own analysis and found at least 100 targets of malware linked to Candiru, including politicians, human rights activists, journalists, academics, embassy workers, and political dissidents [116806]. - The malware sold by Candiru enabled governments to steal passwords, documents, and even turn on microphones to spy on victims, showcasing the extent of control the spyware provided to the attackers [116806]. (b) outside_system: - The software failure incident involving Candiru's spyware was also influenced by contributing factors that originated from outside the system. Governments were the ones generally choosing who to target and running the operations themselves using the spyware sold by Candiru [116806]. - Microsoft reported finding victims in countries like Israel and Iran, indicating that the impact of the spyware extended beyond the initial system boundaries of Candiru [116806]. - The report highlighted concerns about surveillance technologies aiding human rights abuses and law enforcement monitoring, indicating that the consequences of the spyware extended to broader societal implications beyond Candiru's immediate operations [116806].
Nature (Human/Non-human) human_actions (a) The software failure incident occurring due to non-human actions: The software failure incident in this case was not directly caused by non-human actions. The incident involved the use of spyware developed by the Israeli company Candiru, which was used to infect and monitor computers and phones of various targets [116806]. (b) The software failure incident occurring due to human actions: The software failure incident in this case was primarily due to human actions. Candiru, the company behind the spyware, was allegedly selling spyware to governments, enabling them to hack and monitor individuals, including politicians, human rights activists, journalists, academics, embassy workers, and political dissidents. The spyware was used to impersonate legitimate websites of NGOs, activist groups, and news media to trick targets into clicking on malicious links, leading to the installation of malware on their devices [116806].
Dimension (Hardware/Software) software (a) The software failure incident occurring due to hardware: - The article does not mention any specific hardware-related failures contributing to the software incident. Therefore, it is unknown if hardware played a role in this particular software failure incident. (b) The software failure incident occurring due to software: - The software failure incident in this case is primarily attributed to the spyware developed and marketed by the Israeli company Candiru. The spyware created by Candiru was used to infect and monitor computers and phones of various targets, including politicians, human rights activists, journalists, academics, embassy workers, and political dissidents [116806]. - The spyware developed by Candiru was associated with URLs masquerading as NGOs, women's rights advocates, activist groups, health organizations, and news media. This software was used to impersonate high-profile activist groups and not-for-profit organizations, leading to the exploitation of targeted individuals' computers [116806]. - Microsoft conducted its own analysis and found at least 100 targets of malware linked to Candiru, indicating the software's role in enabling the hacks [116806]. - Microsoft took action to disable the "cyberweapons" of Candiru and issued a Windows software update to protect against the malware, highlighting the software aspect of the failure incident [116806].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident related to the Candiru spyware can be classified as malicious. The incident involved the use of spyware developed by Candiru, a secretive Israeli company, to infect and monitor computers and phones of targets, including politicians, human rights activists, journalists, academics, embassy workers, and political dissidents [116806]. The spyware was allegedly used by governments to hack and monitor individuals in civil society, including activists and dissidents, with the potential to steal passwords, documents, and even spy on victims through their microphones [116806]. The spyware was distributed through fake websites impersonating legitimate organizations like Black Lives Matter and Amnesty International, demonstrating a deliberate attempt to deceive targets and exploit their computers [116806]. The incident highlights the malicious nature of the software failure, as it was designed and sold with the intent to aid in surveillance and potentially human rights abuses.
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident: The software failure incident related to the Israeli company Candiru's spyware can be attributed to poor decisions made by the company and its clients. Candiru was linked to fake websites impersonating organizations like Black Lives Matter and Amnesty International to hack targets [116806]. This deceptive tactic of creating websites to trick targets into clicking on malicious links demonstrates a deliberate and unethical approach to surveillance and hacking. Additionally, the company's secretive nature, minimal public information, and sales to governments known for human rights abuses indicate a lack of ethical considerations and accountability in their decision-making processes.
Capability (Incompetence/Accidental) development_incompetence, unknown (a) The software failure incident related to development incompetence is evident in the case of the Israeli company Candiru, which sells spyware to governments. The company's spyware was linked to fake websites impersonating organizations like Black Lives Matter and Amnesty International to hack targets [116806]. This incident showcases a lack of professional competence by the company in developing and deploying spyware that targets individuals through deceptive means. (b) The software failure incident related to accidental factors is not explicitly mentioned in the provided article.
Duration permanent The software failure incident related to the Candiru spyware can be considered as a permanent failure. This is because the spyware was designed and sold by Candiru to enable governments to hack and monitor individuals, indicating a deliberate and ongoing operation rather than a temporary glitch or error [116806]. The spyware allowed for persistent access to victims' computers, potentially enabling governments to steal information and spy on individuals continuously [116806]. Additionally, Microsoft took action to disable the cyberweapons of Candiru and issued a Windows software update to protect against the malware, suggesting a need for a permanent solution to counter the spyware's capabilities [116806].
Behaviour crash, omission, value, other (a) crash: The software failure incident related to the Candiru spyware can be categorized as a crash. The incident involved the spyware infecting and monitoring computers and phones through fake websites impersonating NGOs and activist groups. The malware could enable "persistent access to essentially everything on the computer," potentially allowing governments to steal passwords and documents or turn on a microphone to spy on victims' surroundings [116806]. (b) omission: The software failure incident can also be categorized as an omission. The spyware omitted to perform its intended functions of protecting users' privacy and security by impersonating legitimate websites and silently hijacking control of victims' computers without their knowledge [116806]. (c) timing: The software failure incident is not related to timing issues where the system performs its intended functions but at the wrong time. (d) value: The software failure incident can be categorized as a failure due to the system performing its intended functions incorrectly. The spyware was designed to infect and monitor targets, leading to potential privacy breaches and surveillance activities by governments [116806]. (e) byzantine: The software failure incident is not related to byzantine behavior where the system behaves erroneously with inconsistent responses and interactions. (f) other: The other behavior of the software failure incident is related to the intentional and deceptive nature of the spyware's actions. The spyware was used to impersonate high-profile activist groups and not-for-profit organizations, leading victims to unknowingly click on links that would silently hijack control of their computers for surveillance purposes [116806].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence harm, property, non-human, theoretical_consequence, other (a) unknown (b) harm: The use of spyware can have devastating consequences for activists and dissidents. For example, Ahmed Mansoor, a human rights activist in the United Arab Emirates, faced violence after he was hacked and monitored through spyware purchased by the UAE. He was targeted by sophisticated government phishing attempts, including a 2016 text message with a link on his phone that purported to include information about the torture of detainees in UAE prisons [116806]. (c) unknown (d) property: The malware could enable "persistent access to essentially everything on the computer" potentially allowing governments to steal passwords and documents or turn on a microphone to spy on a victim's surroundings [116806]. (e) unknown (f) non-human: The software failure incident involved spyware that could infect and monitor computers and phones, potentially impacting the devices themselves [116806]. (g) unknown (h) theoretical_consequence: The report highlighted the potential consequences of the spyware industry, such as aiding human rights abuses, law enforcement monitoring, and crackdowns on activist groups. It also mentioned the urgent national security concern of governments being targeted by such technology [116806]. (i) other: The software failure incident involved the impersonation of high-profile activist groups and not-for-profit organizations by creating fake websites to exploit targets, potentially leading to further consequences beyond those explicitly mentioned in the article [116806].
Domain information (a) The software failure incident reported in the articles is related to the industry of information. The incident involves a spyware company, Candiru, that was linked to fake websites impersonating NGOs, women's rights advocates, activist groups, health organizations, and news media to infect and monitor computers and phones [116806]. The spyware was used to target politicians, human rights activists, journalists, academics, embassy workers, and political dissidents in various countries [116806]. (m) Additionally, the incident is related to the "mercenary spyware industry," which is not explicitly mentioned in the provided industry options. The spyware industry, as highlighted in the articles, involves companies like Candiru that sell surveillance technology to governments for monitoring and hacking individuals, raising concerns about human rights abuses and government surveillance [116806].

Sources

Back to List