TechCrunch News 2024年12月05日
Russian programmer says FSB agents planted spyware on his Android phone
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

俄罗斯程序员Parubets称被FSB在手机安装间谍软件。他和妻子回俄处理事务时被FSB突袭,手机密码被强迫交出,后发现可疑软件。该软件能获取大量个人数据,安全专家认定为间谍软件,此事引发对相关问题的担忧。

🌐Parubets和妻子在俄遭FSB突袭,手机密码被强取。

📱Parubets发现手机有可疑间谍软件,获取大量数据。

👨‍💻安全专家认定该软件为间谍软件,与此前恶意软件相似。

⚠️此事提醒人们注意手机被强制获取后的安全风险。

A programmer said the Russian Federal Security Service (FSB) installed spyware on his Android phone after he was detained in Moscow earlier this year. Security researchers confirmed that his phone had spyware installed, likely when the authorities had physical access to his phone and had forced him to give up his passcode. 

For the programmer Kirill Parubets, it was a terrifying and traumatic ordeal. But thanks to his computer expertise and vigilance, his story offers a rare first-hand account of Russian authorities deploying spyware on one of its citizens — not by using a technically advanced remote hacking attack, but with a more crude approach. 

Parubets is a Russian systems analyst who identifies as having Ukrainian heritage, calls himself “an opposition political activist,” and has lived in Ukraine since 2020. Parubets says he has volunteered and given financial and humanitarian aid to Ukrainians after Russia’s full-scale invasion in 2022. 

Parubets said he and his wife travelled back to Russia in 2023 to deal with some paperwork, as they were trying to get Moldovan citizenship, which would have allowed them to remain in Ukraine. 

On April 18, 2024, six FSB agents armed with machine guns burst into Parubets and his wife’s apartment in Moscow at around 6:30 in the morning. “They threw us to the floor, they dragged my wife into a small room, I was lying in the hallway. They didn’t let us get dressed,” according to his recollection of the events, which Parubets wrote in a document he shared with TechCrunch. 

The agents asked him about transfers of money to Ukrainians, as well as about a friend of Parubets, whom he calls using the nickname Ivan Ivanov. (Parubets says he changed Ivan’s name to protect him.) 

“What’s your f—king password?” one of the agents asked Parubets when they picked up his Android phone, according to his recollection of the events. Intimidated, Parubets said he gave away its password. 

On the same day, Parubets said he and his wife were arrested and sentenced to 15 days of administrative arrest. While in detainment, where he said he was also beaten, Parubets said FSB officers visited him and asked about his volunteer activities and donations in Ukraine, as well as donations he made in the name of his friend Ivanov, which they claimed could be classified as treason. Then the FSB officers, according to Parubets, asked him to spy on Ivanov, whom they said had communicated with Ukraine’s Special Services. 

“They threatened me and said that they would put me and my wife in prison for life if I did not provide them with assistance,” said Parubets. 

That’s why Parubets said he decided to tell the agents he would agree to help them, even though he was not actually planning to do it. 

Then, on May 3, Parubets said he and his wife were released and he went to get their belongings back, including his Android phone. Parubets said he shortly after noticed a strange notification that said “Arm cortex vx3 synchronization,” then disappeared and rebooted the phone.

At that point Parubets, who has an interest in cybersecurity, said he inspected his phone and found a suspicious app that had several permissions granted access to a trove of personal data on the phone. At that point, Parubets said he reached out to First Department, a legal assistance organization. The organization in turn reached out to Citizen Lab, a security research and internet watchdog at the University of Toronto, to analyze the suspicious app. 

According to a new Citizen Lab report out Thursday, authored by Cooper Quintin, Rebekah Brown, and John Scott-Railton, the app was indeed spyware. 

The researchers said that the suspicious app identified by Parubets appeared to be “a trojanized version of the genuine Cube Call Recorder application,” a legitimate call recorder app. 

According to the report, the fake app was able to access location information, read and send text messages, install other applications, read the calendar, take screenshots and record from the video camera, see a list of other applications, answer phone calls, and view user account details — all permissions that the real Cube Call Recorder does not have. 

The developers of Cube Call Recorder did not respond to a request for comment. 

Technical experts at First Department, as well as Citizen Lab, believe the spyware is a new version of a malware called Monokle, based on several similarities that the spyware used against Parubets has compared to a previous version of the malware. Monokle was analyzed in 2019 by cybersecurity firm Lookout. At the time, Lookout concluded that Monokle was developed by Special Technology Centre, a St. Petersburg company that has been sanctioned by the U.S. government and other countries for providing technological assistance to the Russian government in its spying activities. 

The Russian Embassy in Washington DC, as well as the press office of the Russian government, did not respond to a request for comment. Neither did the sanctioned Special Technology Centre. 

For Quintin, one of the researchers who analyzed the malware, judging from the functionalities of the spyware found on Parubets’ phone, as well as the previous version analyzed by Lookout, “this malware has been professionally crafted over a number of years.”

Quintin said that Parubet’s story is a reminder that spyware attacks don’t have to be performed for afar, like those done with spyware made by NSO Group, for example.  

“People spend a lot of time thinking about zero-click exploits and zero-day attacks but tend to forget that someone with physical access to your phone who can compel you to unlock it with violence or the threat of violence is just as likely of a risk,” Quintin told TechCrunch.

In the report, Quintin and his colleagues concluded that “any person whose device was confiscated by a security service should assume that the device can no longer be trusted.”

Dmitry Zair-Bek, the head of the First Department human rights project, called out the Russian government and warned that what happened to Parubets may happen to others.  

“We have expected that something similar to the case of Kirill Parubets might begin to happen just because this perfectly aligns with the logic of Russian special services. The scale of the repression is truly terrifying, and a major issue is that there are no longer any ‘red lines’ of what is permissible,” Zair-Bek told TechCrunch. “In addition to Ukrainians, citizens of Western countries visiting Russia are in a particularly high-risk group. They are a tempting target for recruitment and potential imprisonment as hostages.”

After being released, Parubets said he and his wife have left Russia. In an ironic twist, his spyware-ridden phone may have helped him escape, as he left it back in Moscow. 

“I needed to pretend I am still in Moscow,” Parubets said. “To win some time.”

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Parubets 间谍软件 手机安全 FSB
相关文章