The Threat Analysis Group of the company released a report on Thursday on the activities of commercial spyware vendors.
The use of entrepreneurial grade spyware dubbed "Hermit" was detailed in a recent article. The tool allows attackers to steal information and make calls. In their report, the researchers said that the vendor that they attributed to was called Hermit.
There are a lot of significant dangers posed by the man. The functions of the spyware can be changed to the will of the user due to its modularity. Attackers can harvest sensitive information from a target's phone once it's fully located.
The full report by Sevens and Lecigne shows the ways in which attackers can gain access to both devices. Potential targets of this scam will have their data disabled through their internet service provider before they send a malicious link via text to fix the problem. If that doesn't work, targets will be tricked into installing malicious apps.
Last week, Lookout reported the use of Hermit by agents in the governments of Italy, Syria, and Turkey. "TAG is actively tracking more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government-backed actors," according to a statement from the search engine.
The company says it has provided cutting-edge technological solutions and technical support in the field of lawful intercept for more than two decades. In Europe alone, more than 10,000 targets are said to be dealt with daily.
According to the company's website, its core business is the design, production, and implementation of software platforms dedicated to lawful intercept, forensic intelligence, and data analysis and that it helps law enforcement prevent and investigate serious crimes.
It's concerning that the state government agents are using the spy software. It puts at risk the lives of anyone a government considers an enemy of the state such as dissidents, journalists, human rights workers, and opposition party politicians.
Tackling the harmful practices of the commercial surveillance industry will require a robust, comprehensive approach that includes cooperation among threat intelligence teams, network defenders, academic researchers, governments, and technology platforms. We look forward to furthering the safety and security of our users around the world.