[LINK] 'Staatstrojaner'

Roger Clarke Roger.Clarke at xamax.com.au
Mon Oct 10 08:53:11 AEDT 2011


Chaos Computer Club analyzes government malware
2011-10-08 19:00:00, admin
http://www.ccc.de/en/updates/2011/staatstrojaner

The largest European hacker club, "Chaos Computer Club" (CCC), has 
reverse engineered and analyzed a "lawful interception" malware 
program used by German police forces. It has been found in the wild 
and submitted to the CCC anonymously. The malware can not only siphon 
away intimate data but also offers a remote control or backdoor 
functionality for uploading and executing arbitrary other programs. 
Significant design and implementation flaws make all of the 
functionality available to anyone on the internet.  ...


[There are many media reports floating around.  This one's fairly readable.]

Chaos Computer Club: German gov't software can spy on citizens
By Bob Sullivan
http://redtape.msnbc.msn.com/_news/2011/10/08/8228095-chaos-computer-club-german-govt-software-can-spy-on-citizens

...

German courts have long allowed use of a backdoor program known as 
"Bundestrojan" - "federal Trojan," in English - which permits 
government investigators to listen in on Skype-based phone calls as 
part of a legal wiretap order.  Skype and other kinds of Internet 
phone calls that can be encrypted are particularly troubling for law 
enforcement, because they can be used by suspects to evade wiretaps.

After a court battle in 2008, Bundestrojan was ruled legal as long as 
it screened only very specific communications - essentially, Internet 
telephone calls.

But the Chaos Computer Club announced Saturday that it had obtained a 
copy of what it believed was a copy Bundestrojan, and that the 
program has capabilities that go far beyond legal wiretapping. In 
addition to keylogging and screen shots, the software is also capable 
of remote control and upgrade.


"This refutes the claim that an effective separation of just 
wiretapping internet telephony and a full-blown Trojan is possible in 
practice - or even desired.... The Trojan's developers never even 
tried to put in technical safeguards to make sure the malware can 
exclusively be used for wiretapping internet telephony, as set forth 
by the constitution court," said the club on its site. "Our analysis 
revealed once again that law enforcement agencies will overstep their 
authority if not watched carefully. In this case, functions clearly 
intended for breaking the law were implemented in this malware: they 
were meant for uploading and executing arbitrary code on the targeted 
system."

The club also criticized security measures put in place by 
programmers of the alleged Trojan. Poor encryption implementation 
means a malicious third-party could intercept the government 
communications, or take control of government-infected machines, it 
said.

...


-- 
Roger Clarke                                 http://www.rogerclarke.com/
			            
Xamax Consultancy Pty Ltd      78 Sidaway St, Chapman ACT 2611 AUSTRALIA
                    Tel: +61 2 6288 1472, and 6288 6916
mailto:Roger.Clarke at xamax.com.au                http://www.xamax.com.au/

Visiting Professor in the Cyberspace Law & Policy Centre      Uni of NSW
Visiting Professor in Computer Science    Australian National University



More information about the Link mailing list