{"id":13278,"date":"2018-09-05T08:10:11","date_gmt":"2018-09-05T16:10:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/09\/05\/news-7045\/"},"modified":"2018-09-05T08:10:11","modified_gmt":"2018-09-05T16:10:11","slug":"news-7045","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/09\/05\/news-7045\/","title":{"rendered":"When spyware goes mainstream"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Wed, 05 Sep 2018 15:00:00 +0000<\/strong><\/p>\n<p>Stealware.<\/p>\n<p>Surveillanceware.<\/p>\n<p>Stalkerware.<\/p>\n<p>These are terms alternately used to effectively identify a file-based threat that has been around <a href=\"https:\/\/www.malwarebytes.com\/spyware\/\" target=\"_blank\" rel=\"noopener\">since 1996<\/a>: <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/spyware\/\" target=\"_blank\" rel=\"noopener\">spyware<\/a>. More than two decades later, consumer or commercial spyware has gone mainstream, and the surprising number of software designed, openly marketed, and used for spying on people is proof of that.<\/p>\n<p>Forget the government, nation-states, private agencies, and law enforcement. Normal, ordinary citizens can now wield powerful surveillance software and use it against any target they wish\u2014all thanks to \u201clegitimate\u201d companies like <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2015\/09\/thousands-of-hacked-sites-lead-to-offer-of-famous-spy-software\/\" target=\"_blank\" rel=\"noopener\">mSpy<\/a>, Retina-X, FlexiSpy, Family Orbit, TheTruthSpy, and others. While the spyware they market can be placed in the hands of <a href=\"https:\/\/searchsecurity.techtarget.com\/feature\/Employee-privacy-rights-When-is-it-OK-to-spy-on-employees\" target=\"_blank\" rel=\"noopener\">employers who want to keep tabs on employees<\/a> while in the workplace, or in the hands of parents who want to look after their kids, it can also be placed in the hands of stalkers, <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2014\/09\/spyware-installed-on-android-devices-to-stalk-domestic-abuse-victims\/\" target=\"_blank\" rel=\"noopener\">abusive partners<\/a>, or someone who just wants to get a leg up in the divorce proceedings.<\/p>\n<h3>Spyware: spotting the signs<\/h3>\n<p><a href=\"https:\/\/www.malwarebytes.com\/spyware\/\" target=\"_blank\" rel=\"noopener\">Spyware<\/a> is usually stealthy by nature\u2014but that doesn\u2019t mean its activities or the effects of its presence on a desktop machine, laptop, or mobile device aren\u2019t unnoticed. Below is a rundown of common symptoms that may indicate your computing devices have spyware installed:<\/p>\n<p><em>Desktop or laptop:<\/em><\/p>\n<ul>\n<li>Computer or device sluggishness<\/li>\n<li>Crashing (when it normally doesn\u2019t)<\/li>\n<li>Multiple, unexpected pop-ups<\/li>\n<li>Changes in certain browser settings<\/li>\n<li>Unusual redirections to sites you haven\u2019t seen or visited<\/li>\n<li>Difficulty logging in to secure websites<\/li>\n<li>New browser toolbars, widgets, or apps<\/li>\n<li>The appearance of random error messages<\/li>\n<li>Certain browser hotkeys stop working<\/li>\n<\/ul>\n<p><em>Mobile phone or tablet:<\/em><\/p>\n<ul>\n<li>Battery runs out quicker than normal<\/li>\n<li>The device feels warm even when not in use and not charging<\/li>\n<li>Increased data usage\/Internet activity<\/li>\n<li>Clicking, static, echo-y, or distant voices can be heard when on a call<\/li>\n<li>Takes a while to shut down<\/li>\n<li>Unexplained phone charges, phone calls, and messages<\/li>\n<li>Autocorrect features stop working correctly<\/li>\n<li>Longer response time<\/li>\n<li>For iPhones: Presence of the Cydia app (although there are products now that don\u2019t require a jailbroken iPhone)<\/li>\n<li>For iPhones: Request for Apple ID credentials<\/li>\n<\/ul>\n<hr \/>\n<p style=\"text-align: center\"><em>Read: <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/07\/iot-domestic-abuse-can-stop\/\" target=\"_blank\" rel=\"noopener\">IoT domestic abuse: What can we do to stop it?<\/a><\/em><\/p>\n<hr \/>\n<h3>Spying is caring?<\/h3>\n<p>While many of us wrinkle our noses in disgust at spyware, some well-intentioned individuals see the good in planting and using such software in the devices of their loved ones. As mentioned earlier, parents (for example) want to stay in touch with their kids who are out and about. Sometimes simply knowing where they are when Mom or Dad checks up on them\u2014of course they aren&#8217;t going to pick up the phone\u2014can help them go about their day a little easier.<\/p>\n<p>If you are already considering or using commercial spyware to \u201ckeep an eye\u201d on your kids, we suggest you ask yourself the following questions:<\/p>\n<p><strong>Will I be\/Am I breaking any laws? <\/strong><\/p>\n<p>You are, especially if the person you want to spy on doesn\u2019t know you\u2019re doing it. In the US, you\u2019d be breaking the <a href=\"https:\/\/searchcompliance.techtarget.com\/definition\/The-Computer-Fraud-and-Abuse-Act-CFAA\" target=\"_blank\" rel=\"noopener\">Computer Fraud and Abuse Act (CFAA)<\/a> and other similar laws in different countries. The states of Iowa and Washington criminalize some forms of spyware. Even spyware developers have the <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/I-SPY-Act\" target=\"_blank\" rel=\"noopener\">Internet Spyware Prevention Act (or The I-SPY Act)<\/a> to contend with.<\/p>\n<p><strong>Have I already looked for better alternatives? <\/strong><\/p>\n<p>Almost every \u201clegitimate\u201d spy software in the market wears the slogan \u201ccompletely undetectable,\u201d or a variant of it. As we always say, if it sounds too good to be true, it probably is. Not only is spyware often detectable (see symptoms above), it&#8217;s also intruding on privacy. Instead of installing spyware, look for alternative apps that can help you monitor your loved one\u2019s locations without snooping on their other stuff like messages and calls. If you\u2019re an iPhone user, take advantage of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Find_My_Friends\" target=\"_blank\" rel=\"noopener\">Find My Friends<\/a>. For Android users, you can use <a href=\"https:\/\/www.blog.google\/products\/maps\/let-your-loved-ones-know-youre-safe-our-new-personal-safety-app\/\" target=\"_blank\" rel=\"noopener\">Trusted Contacts<\/a>.<\/p>\n<p><strong>Do I know how these companies treat my target\u2019s information? <\/strong><\/p>\n<p>\u201cCarelessly\u201d is probably the first word that comes to mind. Just look at the <a href=\"https:\/\/motherboard.vice.com\/en_us\/topic\/when-spies-come-home\" target=\"_blank\" rel=\"noopener\">number of breaches<\/a> that have happened against spyware companies in the last 18 months. Not only that, hackers who claim to target these companies consistently state that the data they siphoned from spyware targets aren\u2019t encrypted at all.<\/p>\n<p><strong>How would I feel if I were in their shoes? <\/strong><\/p>\n<p>Monitoring a loved one isn\u2019t inherently bad in and of itself, but doing so without consent is, even if it&#8217;s well-intentioned. This is why it\u2019s so important for all individuals involved to\u00a0<em>ask for<\/em>\u00a0and <em>give<\/em> consent when it comes to installing monitoring apps on devices. Spying on someone without them knowing sucks. And when they do find out, even if you mean well, the damage caused by the invasion of privacy and breach of trust could be rather hard to undo.<\/p>\n<p>Whether you think it\u2019s beneficial or not to use spyware doesn\u2019t change the fact that it&#8217;s malware, and therefore, a crime to use it.<\/p>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/when-spyware-goes-mainstream\/\">When spyware goes mainstream<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/when-spyware-goes-mainstream\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Wed, 05 Sep 2018 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/when-spyware-goes-mainstream\/' title='When spyware goes mainstream'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/shutterstock_316392035.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Considering using spyware to surveil a cheating partner or keep an eye on the kiddos? Think again. Not only is it an invasion of privacy, but it&#8217;s illegal. Learn the telltale signs of spyware and why this suddenly mainstream malware needs to go back underground.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/fyi\/\" rel=\"category tag\">FYI<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/malware\/\" rel=\"category tag\">Malware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/android-spying\/\" rel=\"tag\">android spying<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/android-spyware\/\" rel=\"tag\">Android spyware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cfaa\/\" rel=\"tag\">cfaa<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/computer-fraud-and-abuse-adct\/\" rel=\"tag\">computer fraud and abuse adct<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/consumer-spyware\/\" rel=\"tag\">consumer spyware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cydia-app\/\" rel=\"tag\">cydia app<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/find-my-friends\/\" rel=\"tag\">find my friends<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/internet-spy-prevention-act\/\" rel=\"tag\">internet spy prevention act<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ios-spying\/\" rel=\"tag\">ios spying<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mspy\/\" rel=\"tag\">mspy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spyware\/\" rel=\"tag\">spyware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/stalkerware\/\" rel=\"tag\">stalkerware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/stealware\/\" rel=\"tag\">stealware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/surveillanceware\/\" rel=\"tag\">surveillanceware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/the-i-spy-act\/\" rel=\"tag\">the i-spy act<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trusted-contacts\/\" rel=\"tag\">trusted contacts<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/when-spyware-goes-mainstream\/' title='When spyware goes mainstream'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/09\/when-spyware-goes-mainstream\/\">When spyware goes mainstream<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,19401,18828,16806,19402,19403,4503,19404,19405,10520,19406,19407,3764,19408,10443,19409,19410,18209,19411,19412],"class_list":["post-13278","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-android-spying","tag-android-spyware","tag-cfaa","tag-computer-fraud-and-abuse-adct","tag-consumer-spyware","tag-cybercrime","tag-cydia-app","tag-find-my-friends","tag-fyi","tag-internet-spy-prevention-act","tag-ios-spying","tag-malware","tag-mspy","tag-spyware","tag-stalkerware","tag-stealware","tag-surveillanceware","tag-the-i-spy-act","tag-trusted-contacts"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13278"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13278\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}