Megaleecher.Net

Making technology work for you...

Get Your Free Subscription By Email:

China Spying

Chinese Android Phone Comes Pre-loaded With Spyware As Fake Google AppStore

More and more cases on spying using electronic devices are coming into light, few days ago it was reported that NSA of USA is doing targeted spying by intercepting and bugging electronic devices with backdoors to users in their surveillance list. Many countries including USA and India have already banned Chinese technology in sensitive departments after fearing hidden backdoors which can be used for spying, we have also shared the news of Spyware Electric Kettles and Hidden Backdoor in Routers earlier on this blog.

This time the experts at the German security vendor GDATA have discovered dangerous computer malware in firmware of an Android device, the "N9500" model of Android smartphone which is produced by the Chinese manufacturer Star comes per-loaded with Spyware straight from the factory disguised as Google Play Store app giving it full access on the device.

China Android Spyware

It is also not possible to remove the manipulated app and the spyware as they are integrated deep into the firmware preventing removal. Large online retailers are still selling the Android device at prices ranging from 130 to 165 euros and distributing it across Europe.

FBI Can Activate Your Computer Camera Without Triggering The Light Which Tells When It's Recording

We all are now very well aware of the fact that almost all big government's use cyber-warfare to spy on each other and individuals of interest, NSA, USA's cyber-weapon Flame, suspected Chinese spying using Electric Kettles and other communication devices are prime public examples of this.

The latest revelations made by "The Washington Post's" story "FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance" provides further glimpses onto how intrusive these tactics can get. The FBI's ability to covertly activate a users computer camera without triggering the notification light which informs the user that it is being recorded is one such example, While used for good purpose of catching criminals and controlling terrorism now what happens when the technology gets leaked or gets abused by whom which have access to it now to settle personal scores or invade one's privacy?

FBI Camera Spying

Russia Finds Hidden Chips Inside Chinese Electric Iron And Kettles That Scans Wi-Fi To Serve Malware

News reports from Russia's state-owned channel Rossiya 24 showed footage of a technician opening up an iron included in a batch of Chinese imports to find a "spy chip" with "a little microphone" embedded into it. These hidden, embedded electronic chips are scanning and connecting to any computer within a 200m radius with unprotected Wi-Fi networks, once connected these "Trojan devices" were being used to spread viruses.

While the report says that the malware is being used to send SPAM, piggy-banking on infected computer's internet connection and resources without the owner's knowledge about it, our recent story "Hidden Backdoor In Your Internet Router - With Love, From China !!" and the fact that the rogue devices had "an microphone" further establishes the fact that these are or can be used for spying. The researchers also found other products having these rogue components including mobile phones, car dashboard cameras and electric kettles.

Kettle Malware

Hidden Backdoor In Your Internet Router - With Love, From China !!

Chinese telecom companies have been accused of embedding spying technologies into enterprise level telecom hardware for Chinese government, now a new research done by embedded device hacker "Craig Heffner" unearthed that consumer level internet router's made by Chinese companies come bundled with a secret backdoor which allows full root level access to the consumer router.

He unveiled secret backdoors embedded inside a number of D-Link and Tenda brand routers which are manufactured in China and are sold all around the globe. The beauty of this type of backdoor is that these are undetectable by antivirus software's and bypass almost all sorts of security measures as the loophole is sitting at the very start of network access chain supplying and controlling access to everything else after it - this is sort of your gatekeeper being the enemy Trojan. Unlike NSA PRISM spying this would also be a more easy, distributed, cost-efficient and targeted form of government spying.

Tenda
This is just one of the many helpful tips we have posted, You can find more stories here,
Do subscribe to updates using your favorite RSS feed reader or using the secure FeedBurner email update form on top of this post.