{"id":8834,"date":"2022-06-24T11:36:39","date_gmt":"2022-06-24T11:36:39","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=8834"},"modified":"2022-06-24T20:46:11","modified_gmt":"2022-06-24T20:46:11","slug":"google-reports-italian-spyware","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/google-reports-italian-spyware\/","title":{"rendered":"Google Report Companies Creating Mobile Spyware for Governments"},"content":{"rendered":"<h2 style=\"text-align:center\">Google Reveals An Italian Company to Sell Android and iOS Spyware to Governments<\/h2>\n<p style=\"text-align:justify\">In its blog, Google has published a <a href=\"https:\/\/blog.google\/threat-analysis-group\/italian-spyware-vendor-targets-users-in-italy-and-kazakhstan\/\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a> revealing that multiple companies have been crafting and selling <strong><a href=\"\/spyware\">spyware<\/a> exploiting mobile devices&#8217; <a href=\"\/zeroday\">zero-day vulnerabilities<\/a><\/strong> discovered by Google specialists last year. The post includes code fragments from the disputed malware.<\/p>\n<p style=\"text-align:justify\">Over <strong>30 companies<\/strong> turned out to create and sell surveillance-aimed pieces of software, with overall 7 out of 9 Google-revealed vulnerabilities being exploited mostly for the needs of <strong>government-related actors<\/strong> in different states.<\/p>\n<p style=\"text-align:justify\">Thus, being consistent with a previously made <a href=\"https:\/\/www.lookout.com\/blog\/hermit-spyware-discovery\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a> by the <strong>Lookout Inc.<\/strong> security software company, the Google research shows that <strong>RCS Lab S.p.A.<\/strong> (headquarters in Milan, Italy) has designed infecting spyware for <strong>Android <\/strong>and <strong>iOS<\/strong> devices to be used in <strong>Italy <\/strong>and <strong>Kazakhstan <\/strong>by governments of these countries. Lookout Inc. has traced the connection between the Italian company and the modular spyware <strong>Hermit<\/strong>, deployed in Kazakhstan. Lookout Inc. stressed that despite reasoning about the benignancy of the pro-governmental spyware development (done by companies like RCS Lab,) in reality, such software often ends up in the wrong hands and is used to spy on businesses and individuals.<\/p>\n<p style=\"text-align:justify\">Google experts express concerns about surveillance capacities moving from being exclusively accessible to governments to being created, sold, and potentially used by private organizations. Such a state of affairs brings new threats and wreaks chaos into the digital world.<\/p>\n<p style=\"text-align:justify\">As for RCS Lab, the company states on its official LinkedIn page that it &#8220;has been operating since 1993 in the world market of services <strong>in support of the investigative activity of Government Bodies<\/strong>&#8220;. To decide whether this self-presentation justifies creating surveillance malware for Kazakhstan and, earlier, Chile, Pakistan, Mongolia, Bangladesh, Myanmar, Vietnam, Turkmenistan, and Syria is up to our readers.<\/p>\n<p style=\"text-align:justify\"><strong>Zero-day vulnerabilities<\/strong> are the software or hardware defects that exist after the product&#8217;s release and before the issue of relevant patches. Vulnerabilities do not necessarily get exploited. That is why some of them remain either unnoticed or unused for years. Techniques, programs, pieces of code, and data items used to benefit from a vulnerability are called exploits.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google Reveals An Italian Company to Sell Android and iOS Spyware to Governments In its blog, Google has published a report revealing that multiple companies have been crafting and selling spyware exploiting mobile devices&#8217; zero-day vulnerabilities discovered by Google specialists last year. The post includes code fragments from the disputed malware. Over 30 companies turned [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":8848,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[114,27,58,115,48],"class_list":{"0":"post-8834","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-android","9":"tag-android-malware","10":"tag-google","11":"tag-ios","12":"tag-spyware"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/SPWR.jpg","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/8834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=8834"}],"version-history":[{"count":6,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/8834\/revisions"}],"predecessor-version":[{"id":8925,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/8834\/revisions\/8925"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/8848"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=8834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=8834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=8834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}