top | item 21684317

Spying tools website taken down after UK raids

95 points| LinuxBender | 6 years ago |bbc.com

75 comments

order
[+] Rotten194|6 years ago|reply
For people who believe the marketing: why would a legitimate sysadmin tool include a cryptocurrency miner and a feature to turn off the webcam indicator light?

This was used to exploit people, plain and simple. While I don't think blanket arresting people who downloaded it is reasonable (someone may have fallen for the marketing and used it for legit reasons), shutting down the C&C servers to disable it from working and aiding in exploitation & blackmail is a net good.

[+] kauffj|6 years ago|reply
From a purely consequentialist perspective, it's not clearly a net good if it has a chilling effect on legitimate research, increases economic costs due to regulatory uncertainty, or has other negative second-order effects concomitant with arbitrary and overly subjective legal systems.

From a deontological perspective, it's not clear that this is good if one of your values is clearly and consistently enforced law.

[+] scoot|6 years ago|reply
> a feature to turn off the webcam indicator light

I naively always assumed that a webcam indicator light was hard wired to turn on when the camera was in use. If it isn't, why on earth not?

[+] nested_callback|6 years ago|reply
For the people that think this is legitimate software, this is not legitimate software. It is sold and encouraged as malware, used to blackmail girls (barely women) - that's what "cam capture" is for - keylogger, general malware, backconnect proxy, auto-start and persistence.

See https://unit42.paloaltonetworks.com/imminent-monitor-a-rat-d... for more details and screenshots/quotes of posts by the creator of the tool.

This is _not_ for server administration.

This is _not_ like PuTTY or Remote Desktop. This is like Blackshades or Orcus. It is malicious, only sold for malicious usage.

[+] jascii|6 years ago|reply
I don't think anyone seriously doubts the intended, arguable unethical, use of IM-RAT. The question is whether authoring and or selling these tools is or should be illegal. I'd argue that would set a dangerous precedent allowing governments to go after any security researchers whenever they feel it convenient to do so.
[+] msla|6 years ago|reply
https://en.wikipedia.org/wiki/Robbins_v._Lower_Merion_School...

> Robbins v. Lower Merion School District is a federal class action lawsuit,[2] brought in February 2010 on behalf of students of two high schools in Lower Merion Township, a suburb of Philadelphia.[3] In October 2010, the school district agreed to pay $610,000 to settle the Robbins and parallel Hasan lawsuits against it.[1]

> The suit alleged that, in what was dubbed the "WebcamGate" scandal, the schools secretly spied on the students while they were in the privacy of their homes.[4][5] School authorities surreptitiously and remotely activated webcams embedded in school-issued laptops the students were using at home.[6][7] After the suit was brought, the school district, of which the two high schools are part, revealed that it had secretly taken more than 66,000 images.[8][9] The suit charged that in doing so the district infringed on its students' privacy rights.[6][10][11] A federal judge issued a preliminary injunction, ordering the school district to stop its secret webcam monitoring, and ordered the district to pay the plaintiffs' attorney fees.[12][13][14]

> The lawsuit was filed after 15-year-old high school sophomore (second year student) Blake Robbins was disciplined at school for his behavior in his home.

Acknowledging that the school was found to have been in the wrong and that the courts came down on the side of privacy, is the company which sold the school district the software they used to violate privacy guilty of anything? Should it be?

The company involved:

https://en.wikipedia.org/wiki/HEAT_LANrev

... said its software was intended to be used for theft recovery. Easier to recover stolen goods if the laptop can surreptitiously take pictures of its surroundings and send them home, see? Is that software inherently bad, like the software you're talking about is? It could certainly be used for the same thing.

[+] pbhjpbhj|6 years ago|reply
>By seizing control of the website, police will have been able to "take a good look at what the site has been up to, including who has bought the illegal items", said Prof Alan Woodward, a cyber-security expert from the University of Surrey. //

When did the law pass making owning software illegal, as opposed to using it for nefarious means? (Last time I looked CMA required use.)

Anyone have details of the exact charge?

[+] matthewheath|6 years ago|reply
No charges seem to have been brought yet – but it's an offence under Section 3A of the Computer Misuse Act 1990 (CMA) to obtain articles for use in offence under Sections 1, 3, or 3ZA CMA, even if you don't actually use them.

Obviously, the prosecution would need to prove intent but it's possible the mere presence of the software could suffice for mens rea — people don't typically buy this software accidentally.

Presumably most people who bought the software will have used it, making a prosecution under S1 CMA more likely.

It's probable that the CPS will only charge people they are likely to get an S1 conviction from and discard any S3A charges as S3A charges will be difficult to prove.

[+] heyyyouu|6 years ago|reply
This was my thought as well. It has to be some sort of UK law? But I can't find it. The laws apply to surreptitiously installing the software on someone else's phone or computer. But then owning (and/or buying) the software shouldn't be illegal and the site shouldn't have been able to come down.

Hacking tools aren't illegal by default, that I know of anyway.

[+] jascii|6 years ago|reply
An article with a bit more details: https://www.bleepingcomputer.com/news/security/law-enforceme...

From what I gleaned from that article, IM-RAT was publicly marketed as a remote management tool.

The article further states: "With the amount of reports of this tool being used for malware and the discussion on illegal forums, it would be very hard for the developer to argue that he did not know how the software was being used."

This seems pretty thin. Would the authors of say nmap be liable because people can/do use it for illegal purposes?

Assuming judges signed of on the raids and domain seizure, I sure hope there was evidence of actual criminal activity beyond what is mentioned in the media.

[+] rhizome|6 years ago|reply
>Would the authors of say nmap be liable because people can/do use it for illegal purposes?

Don't give them any ideas.

[+] rahuldottech|6 years ago|reply
A snapshot of the website from October: https://web.archive.org/web/20191012003358/https://imminentm...

What it looks like now: https://imminentmethods.net/

Their YouTube channel is still up: https://www.youtube.com/channel/UCRgeFHip2Iz97P25_qGkPfw/fee...

As is their Twitter account: https://twitter.com/imminentmethods

From what I can tell, this is just server administration software, but I haven't taken a close look.

Edit: Yeah, apparently it was just disguised as that.

[+] michaelt|6 years ago|reply
People have been calling trojan horses "administration software" since at least Back Orifice in 1998 - probably before.

This is "administration software" in the same way the cannabis-leaf-engraved glass smoking pipes sold in your local weed shop are "for tobacco use only"

[+] mirimir|6 years ago|reply
Why the bloody hell would a firm selling this stuff commercially be so easy to track down and take down?

I can't imagine how people are so clueless.

I mean, is it like "Sure, we're doing iffy stuff, but it's all in good fun, so why would anyone ever bother us?"

[+] MercuryRising13|6 years ago|reply
Wow,about time they started taking down those sites. No only if other places would as well.
[+] blowski|6 years ago|reply
What was the software really used for? Did it have a valid use case?
[+] eitland|6 years ago|reply
Check the archive.org link elsewhere in the thread. Seems like it was marketed like a remote admin tool for servers, not a stalking tool.

Unless they have a history of specifically targeting stalkers with their marketing and/or aiding stalkers or something else I hope the case gets thrown out.

Even then I hope the courts take a good look at this case.

Note: I'm not very happy about stalkers, but we should stick to the laws and not go after people without a good reason.

[+] dylz|6 years ago|reply
This looks like bog standard RAT software. I don't imagine any legitimate or valid use cases. Nothing special or unique as far as I can tell?
[+] Quarrelsome|6 years ago|reply
sometimes manipulative people install it on their partner's machines because they're paranoid and have a poisonous attitude to relationships.
[+] dk3|6 years ago|reply
Are they going to shut down Github next?
[+] eitland|6 years ago|reply
Currently downvoted but very valid point, ref the Sherlock tool posted the other day: it is not hard for me to imagine more bad uses for it than good, but that alone shouldn't make it illegal.

Same with guns.