{"id":16160,"date":"2019-07-11T10:52:16","date_gmt":"2019-07-11T14:52:16","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/finspy-commercial-spyware\/16160\/"},"modified":"2020-04-02T16:07:48","modified_gmt":"2020-04-02T10:37:48","slug":"finspy-commercial-spyware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/finspy-commercial-spyware\/16160\/","title":{"rendered":"FinSpy \u2014 commercial spyware"},"content":{"rendered":"<p>What happens when spyware is developed not by underground malware coders, but by a serious IT firm? The result can be a nasty thing like FinSpy (also known as FinFisher), which has been developed and sold perfectly legally for quite some time now. Over the past year, we\u2019ve detected this spyware on dozens of mobile devices.<\/p>\n<h2>What FinSpy gets up to<\/h2>\n<p>Although a desktop version of the spyware exists (not only for Windows, but also for macOS and Linux), the greatest danger largely comes from mobile implants: FinSpy can be installed on both iOS and Android, with the same set of functions available for each platform. The app gives an attacker almost total control over the data on an infected device.<\/p>\n<p>The malware can be configured individually for each victim and in such a way that provides the attack mastermind with detailed information about the user, including contacts, call history, geolocation, texts, calendar events, and so on.<\/p>\n<p>But that\u2019s not all. FinSpy can record voice and VoIP calls, and intercept instant messages. It has the ability to eavesdrop on many communication services\u00a0\u2014 WhatsApp, WeChat, Viber, Skype, Line, Telegram, as well as Signal and Threema. Besides messages, FinSpy extracts files sent and received by victims in messaging apps, as well as data about groups and contacts. More details about FinSpy <a target=\"_blank\" href=\"https:\/\/securelist.com\/new-finspy-ios-and-android-implants-revealed-itw\/91685\/\" rel=\"noopener noreferrer\">are available on Securelist<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n<h3>Who should beware of FinSpy<\/h3>\n<p>Getting infected with FinSpy happens the same as with most types of malware. It\u2019s most often a case of clicking a link in a malicious e-mail or text message.<\/p>\n<p>Android device owners are traditionally in the risk zone, and if their gadgets are also <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/android-root-faq\/17135\/\" rel=\"noopener noreferrer nofollow\">rooted<\/a>, that greatly facilitates the task of the malware. If, however, the user does not have root access, but a rooting app is installed on the smartphone (as happens when superuser rights are required for installation of some other app), FinSpy can exploit this to obtain the root. Even if a smartphone isn\u2019t rooted, and it has no rooting apps installed, the spyware can get root access using the DirtyCow exploit.<\/p>\n<p>Apple users have a slightly easier time. The iOS version of the spyware requires a system <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/jailbreak\/?utm_source=securelist&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">jailbreak<\/a>. If by some chance the iPhone\/iPad owner already did it, the device can be infected in the same way as an Android gadget. But if not, the attacker needs to gain physical access to the device, jailbreak it manually, and then install FinSpy.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/07\/11202347\/finspy-commercial-spyware-infographic-EN.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2019\/07\/11202347\/finspy-commercial-spyware-infographic-EN.png\" alt=\"How FinSpy\/FinFisher infects mobile devices, and what data it steals\" width=\"1200\" height=\"1698\" class=\"aligncenter size-full wp-image-16163\"><\/a><\/p>\n<h3>How to guard against FinSpy<\/h3>\n<p>To avoid falling victim to FinSpy and similar spyware, you need to follow the standard guidelines:<\/p>\n<ul>\n<li>Do not follow suspicious links in e-mails, instant messages, or text messages.<\/li>\n<li>Do not try to gain root access (Android) or perform a jailbreak (iOS) on devices that have access to critical data.<\/li>\n<li>Use a reliable <a href=\"https:\/\/www.kaspersky.co.in\/internet-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener\">security solution<\/a> able to detect this type of threat; iPhone owners should bear in mind that unfortunately there are no such solutions for iOS (<a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/ios-security-explainer\/23811\/\" rel=\"noopener noreferrer nofollow\">and here\u2019s why<\/a>).<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n","protected":false},"excerpt":{"rendered":"<p>FinSpy is spyware for Android, iOS, Windows, macOS, and Linux that is sold legally. What it can do and how to defend yourself.<\/p>\n","protected":false},"author":2506,"featured_media":16161,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2196],"tags":[105,2788,1219,430,2633,689,587,583],"class_list":{"0":"post-16160","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-finspy","10":"tag-ios","11":"tag-mobile-devices","12":"tag-root","13":"tag-spyware","14":"tag-telegram","15":"tag-whatsapp"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/finspy-commercial-spyware\/16160\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/finspy-commercial-spyware\/13666\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/finspy-commercial-spyware\/18053\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/finspy-commercial-spyware\/16189\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/finspy-commercial-spyware\/14942\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/finspy-commercial-spyware\/18869\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/finspy-commercial-spyware\/17615\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/finspy-commercial-spyware\/23082\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/finspy-commercial-spyware\/6138\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/finspy-commercial-spyware\/27606\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/finspy-commercial-spyware\/11963\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/finspy-commercial-spyware\/12074\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/finspy-commercial-spyware\/10971\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/finspy-commercial-spyware\/19721\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/finspy-commercial-spyware\/23625\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/finspy-commercial-spyware\/24022\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/finspy-commercial-spyware\/18666\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/finspy-commercial-spyware\/22974\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/finspy-commercial-spyware\/22913\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/spyware\/","name":"spyware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/16160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2506"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=16160"}],"version-history":[{"count":12,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/16160\/revisions"}],"predecessor-version":[{"id":20190,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/16160\/revisions\/20190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/16161"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=16160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=16160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=16160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}