What you need to know about stalkerware Eva Galperin

I want you to travel back in time with me,

to the before time, to 2017.

I don’t know if you can remember it,

dinosaurs were roaming the earth.

I was a security researcher,

I had spent about five or six years

doing research on the ways in which APTs,

which is short for advanced
persistent threats,

which stands for nation-state actors,

spy on journalists and activists

and lawyers and scientists

and just generally people
who speak truth to power.

And I’d been doing this for a while

when I discovered
that one of my fellow researchers,

with whom I had been
doing this all this time,

was allegedly a serial rapist.

So the first thing that I did

was I read a bunch of articles about this.

And in January of 2018,

I read an article
with some of his alleged victims.

And one of the things
that really struck me about this article

is how scared they were.

They were really frightened,

they had, you know,
tape over the cameras on their phones

and on their laptops,

and what they were worried about
was that he was a hacker

and he was going to hack into their stuff

and he was going to ruin their lives.

And this had kept them silent
for a really long time.

So, I was furious.

And I didn’t want anyone
to ever feel that way again.

So I did what I usually do when I’m angry:

I tweeted.

(Laughter)

And the thing that I tweeted

was that if you are a woman
who has been sexually abused by a hacker

and that hacker has threatened
to break into your devices,

that you could contact me

and I would try to make sure

that your device got a full,
sort of, forensic look over.

And then I went to lunch.

(Laughter)

Ten thousand retweets later,

(Laughter)

I had accidentally started a project.

So every morning,
I woke up and my mailbox was full.

It was full of the stories
of men and women

telling me the worst thing
that had ever happened to them.

I was contacted by women
who were being spied on by men,

by men who were being spied on by men,

by women who were being spied on by women,

but the vast majority
of the people contacting me

were women who had been
sexually abused by men

who were now spying on them.

The one particularly interesting case

involved a man who came to me,

because his boyfriend had outed him as gay

to his extremely
conservative Korean family.

So this is not just
men-spying-on-women issue.

And I’m here to share

what I learned from this experience.

What I learned is that data leaks.

It’s like water.

It gets in places you don’t want it.

Human leaks.

Your friends give away
information about you.

Your family gives away
information about you.

You go to a party,

somebody tags you as having been there.

And this is one of the ways

in which abusers pick up
information about you

that you don’t otherwise
want them to know.

It is not uncommon for abusers
to go to friends and family

and ask for information
about their victims

under the guise of being concerned
about their “mental health.”

A form of leak that I saw

was actually what we call
account compromise.

So your Gmail account,

your Twitter account,

your Instagram account,

your iCloud,

your Apple ID,

your Netflix, your TikTok –

I had to figure out what a TikTok was.

If it had a login,

I saw it compromised.

And the reason for that is because
your abuser is not always your abuser.

It is really common for people
in relationships to share passwords.

Furthermore, people who are intimate,

who know a lot about each other,

can guess each other’s security questions.

Or they can look over
each other’s shoulders

to see what code they’re using
in order to lock their phones.

They frequently have
physical access to the phone,

or they have physical access
to the laptop.

And this gives them a lot of opportunity

to do things to people’s accounts,

which is very dangerous.

The good news is that we have advice

for people to lock down their accounts.

This advice already exists,
and it comes down to this:

Use strong, unique passwords
for all of your accounts.

Use more strong, unique passwords

as the answers to your security questions,

so that somebody who knows
the name of your childhood pet

can’t reset your password.

And finally, turn on the highest level
of two-factor authentication

that you’re comfortable using.

So that even if an abuser
manages to steal your password,

because they don’t have the second factor,

they will not be able
to log into your account.

The other thing that you should do

is you should take a look
at the security and privacy tabs

for most of your accounts.

Most accounts have
a security or privacy tab

that tells you
what devices are logging in,

and it tells you where
they’re logging in from.

For example, here I am,

logging in to Facebook from the La Quinta,

where we are having this meeting,

and if for example,

I took a look at my Facebook logins

and I saw somebody logging in from Dubai,

I would find that suspicious,

because I have not been
to Dubai in some time.

But sometimes, it really is a RAT.

If by RAT you mean remote access tool.

And remote access tool

is essentially what we mean
when we say stalkerware.

So one of the reasons why
getting full access to your device

is really tempting for governments

is the same reason why
getting full access to your device

is tempting for abusive partners
and former partners.

We carry tracking devices
around in our pockets all day long.

We carry devices
that contain all of our passwords,

all of our communications,

including our end-to-end
encrypted communications.

All of our emails, all of our contacts,

all of our selfies are all in one place,

often our financial information
is also in this place.

And so, full access to a person’s phone

is the next best thing
to full access to a person’s mind.

And what stalkerware does
is it gives you this access.

So, you may ask, how does it work?

The way stalkerware works

is that it’s a commercially
available program,

which an abuser purchases,

installs on the device
that they want to spy on,

usually because they have physical access

or they can trick their target
into installing it themselves,

by saying, you know,

“This is a very important program
you should install on your device.”

And then they pay the stalkerware company

for access to a portal,

which gives them all
of the information from that device.

And you’re usually paying
something like 40 bucks a month.

So this kind of spying
is remarkably cheap.

Do these companies know

that their tools

are being used as tools of abuse?

Absolutely.

If you take a look
at the marketing copy for Cocospy,

which is one of these products,

it says right there on the website

that Cocospy allows you
to spy on your wife with ease,

“You do not have to worry
about where she goes,

who she talks to
or what websites she visits.”

So that’s creepy.

HelloSpy, which is another such product,

had a marketing page
in which they spent most of their copy

talking about the prevalence of cheating

and how important it is
to catch your partner cheating,

including this fine picture of a man

who has clearly just caught
his partner cheating

and has beaten her.

She has a black eye,
there is blood on her face.

And I don’t think that there is
really a lot of question

about whose side HelloSpy is on
in this particular case.

And who they’re trying to sell
their product to.

It turns out that if you have stalkerware
on your computer or on your phone,

it can be really difficult to know
whether or not it’s there.

And one of the reasons for that

is because antivirus companies

often don’t recognize
stalkerware as malicious.

They don’t recognize it as a Trojan

or as any of the other stuff
that you would normally find

that they would warn you about.

These are some results
from earlier this year from VirusTotal.

I think that for one sample
that I looked at

I had something like
a result of seven out of 60

of the platforms recognized
the stalkerware that I was testing.

And here is another one
where I managed to get 10,

10 out of 61.

So this is still some very bad results.

I have managed to convince
a couple of antivirus companies

to start marking stalkerware as malicious.

So that all you have to do

if you’re worried about having
this stuff on your computer

is you download the program,

you run a scan and it tells you

“Hey, there’s some potentially
unwanted program on your device.”

It gives you the option of removing it,

but it does not remove it automatically.

And one of the reasons for that

is because of the way that abuse works.

Frequently, victims of abuse aren’t sure

whether or not they want
to tip off their abuser

by cutting off their access.

Or they’re worried that their abuser
is going to escalate to violence

or perhaps even greater violence

than they’ve already been engaging in.

Kaspersky was one
of the very first companies

that said that they were going to start
taking this seriously.

And in November of this year,

they issued a report in which they said

that since they started tracking
stalkerware among their users

that they had seen
an increase of 35 percent.

Likewise, Lookout came out
with a statement

saying that they were going to take this
much more seriously.

And finally, a company called Malwarebytes
also put out such a statement

and said that they had found
2,500 programs

in the time that they had been looking,

which could be classified as stalkerware.

Finally, in November
I helped to launch a coalition

called the Coalition Against Stalkerware,

made up of academics,

people who are doing
this sort of thing on the ground –

the practitioners of helping people to
escape from intimate partner violence –

and antivirus companies.

And our goal is both to educate people
about these programs,

but also to convince
the antivirus companies

to change the norm

in how they act around
this very scary software,

so that soon, if I get up in front of you

and I talk to you about this next year,

I could tell you that the problem
has been solved,

and all you have to do
is download any antivirus

and it is considered normal
for it to detect stalkerware.

That is my hope.

Thank you very much.

(Applause)

我想让你和我一起穿越

回到过去,回到2017年。

我不知道你是否还记得,

恐龙在地球上漫游。

我是一名安全研究员,

我花了大约五六年的时间

研究 APT(

高级
持续威胁的缩写

,代表民族国家行为者)如何

监视记者、活动家

、律师和科学家,

以及 通常
是对权力说真话的人。

当我发现我一直在做这件事的

一位研究人员同事据称是一名连环强奸犯

时,我已经这样做了一段时间

所以我做的第一件事就是

读了一堆关于这个的文章。

2018 年 1 月,

我读了一篇
关于他的一些所谓受害者的文章。

这篇文章真正让我印象深刻的一件事

是他们有多害怕。

他们真的很害怕

,你知道,
他们在手机和笔记本电脑上的摄像头上贴了胶带

,他们担心
的是他是个黑客

,他会侵入他们的东西

,他会毁了 他们的生活。

这让他们
沉默了很长时间。

所以,我很生气。

我不想
让任何人再次有这种感觉。

所以我做了我生气时通常会做的事情:

我发推文。

(笑声)

我在推特上说的

是,如果你是一个
被黑客性侵的女人,

而且那个黑客威胁
要闯入你的设备

,你可以联系我

,我会尽力

确保你的设备 进行了全面
的法医检查。

然后我去吃午饭。

(笑声)

一万次转发之后,

(笑声)

我不小心开始了一个项目。

所以每天早上,
我醒来,我的邮箱都满了。

它充满
了男人和女人的故事,

告诉我
他们曾经发生过的最糟糕的事情。


男人窥探的女人、

被男人窥探的男人、

被女人窥探的女人

联系了我,但联系我的绝大多数

是被
性侵的女性

现在正在监视他们的人。

一个特别有趣的案例

涉及一个来找我的男人,

因为他的男朋友在

他极其
保守的韩国家庭中将他列为同性恋。

所以这不仅仅是
男人监视女人的问题。

我在这里分享

我从这次经历中学到的东西。

我了解到的是数据泄漏。

就像水一样。

它会到达你不想要的地方。

人为泄密。

你的朋友会泄露
你的信息。

你的家人泄露了
关于你的信息。

你去参加一个聚会,

有人给你贴上你去过那里的标签。

这是

施虐者
获取

您不
希望他们知道的信息的方式之一。

施虐者
以关心他们的“心理健康”为幌子去朋友和家人

那里询问
有关受害者的信息并不少见

我看到的一种泄漏形式

实际上就是我们所说的
帐户泄露。

所以你的 Gmail 账户、

你的 Twitter 账户、

你的 Instagram 账户、

你的 iCloud、

你的 Apple ID、

你的 Netflix、你的 TikTok——

我必须弄清楚 TikTok 是什么。

如果它有登录名,

我看到它受到了损害。

原因是
你的施虐者并不总是你的施虐者。

恋爱中的人共享密码真的很常见。

此外,亲密的人,

彼此了解很多,

可以猜出对方的安全问题。

或者他们可以
互相查看对方的肩膀

,看看他们使用什么密码
来锁定他们的手机。

他们经常可以
物理访问电话,

或者他们可以物理
访问笔记本电脑。

而这让他们有很多机会

对人家的账户做事,

这是非常危险的。

好消息是,我们

建议人们锁定他们的帐户。

这个建议已经存在
,它归结为:为您的所有帐户

使用强大、唯一的密码

使用更强大、更独特的密码

作为安全问题的答案,

这样
知道您童年宠物名字的人

就无法重置您的密码。

最后,打开您习惯使用的最高级别
的双因素身份

验证。

这样即使滥用者
设法窃取了您的密码,

因为他们没有第二个因素,

他们也将
无法登录您的帐户。

您应该做的另一件事

是您应该查看大多数帐户
的安全和隐私选项卡

大多数帐户都有
一个安全或隐私选项卡

,可以告诉您
哪些设备正在登录,

并告诉您
他们从哪里登录。

例如,我在这里,

从我们正在举行这次会议的拉昆塔登录 Facebook

,例如,如果

我查看了我的 Facebook 登录信息

,发现有人从迪拜登录,

我会发现这很可疑 ,

因为我已经有
一段时间没有去过迪拜了。

但有时,它真的是一只老鼠。

如果通过 RAT,您的意思是远程访问工具。

当我们说跟踪软件时,远程访问工具

本质上就是我们的
意思。

因此,
获得对您设备的完全访问权限

对政府来说确实很有吸引力

的原因之一,与
获得对您设备的完全访问权限

对滥用职权的合作伙伴
和以前的合作伙伴很有吸引力的原因是一样的。

我们
整天都在口袋里随身携带跟踪设备。

我们携带的设备
包含我们所有的密码、我们的

所有通信,

包括我们的端到端
加密通信。

我们所有的电子邮件,我们所有的联系人,我们

所有的自拍都在一个地方,

通常我们的财务
信息也在这个地方。

因此,完全访问一个人的电话


完全访问一个人的思想的下一个最佳选择。

stalkerware 所做的
是它为您提供了这种访问权限。

所以,你可能会问,它是如何工作的?

stalkerware 的工作

方式是它是一个商业
可用的程序

,施虐者购买后

安装在
他们想要监视的设备上,

通常是因为他们有物理访问权限,

或者他们可以欺骗目标
自己安装它

,你知道 ,

“这是一个非常重要的程序,
您应该安装在您的设备上。”

然后他们向跟踪软件公司

支付访问门户的费用,

该门户为他们
提供了来自该设备的所有信息。

而且您通常每月支付
40 美元。

所以这种间谍活动
非常便宜。

这些公司是否

知道他们的工具

被用作滥用工具?

绝对地。

如果你看
一下 Cocospy 的营销文案,

这是其中一种产品,

它在网站

上写着 Cocospy 可以让你
轻松监视你的妻子,

“你不必
担心她去哪里,

她与谁交谈
或访问了哪些网站。”

所以这很令人毛骨悚然。

HelloSpy 是另一种这样的产品,它

有一个营销页面
,他们在其中的大部分副本都

在谈论作弊的普遍性

以及
抓住你的伴侣作弊的重要性,

包括这张显然刚刚抓住他的男人的精美照片

伴侣作弊

并殴打她。

她的眼睛是黑的,
脸上有血。

而且我认为

在这种特殊情况下,关于 HelloSpy 站在哪一边的问题并不多。

以及他们试图将
产品卖给谁。

事实证明,如果
您的计算机或手机上有跟踪软件,

则很难知道
它是否存在。

原因之一

是防病毒公司

通常不会将
跟踪软件识别为恶意软件。

他们不会将其识别为特洛伊木马


您通常会

发现他们会警告您的任何其他东西。

这些是
今年早些时候来自 VirusTotal 的一些结果。

我认为,对于
我查看的一个样本,

60 个平台中有 7 个

识别出我正在测试的跟踪软件。

这是
另一个我设法在 61 中获得 10 和

10 的

结果。所以这仍然是一些非常糟糕的结果。

我已经成功说服
了几家防病毒

公司开始将跟踪软件标记为恶意软件。

因此,

如果您担心
计算机上有这些东西,您所要做的

就是下载程序

,运行扫描,它会告诉您

“嘿,
您的设备上有一些可能不需要的程序。”

它为您提供了删除它的选项,

但它不会自动删除它。

造成这种

情况的原因之一是滥用的方式。

通常,虐待的受害者

不确定他们是否想通过
切断他们的访问来向施虐者提供小费

或者他们担心
施虐者会升级为暴力,

甚至可能

比他们已经参与的暴力更严重。

卡巴斯基是最早

表示将开始
认真对待这一问题的公司之一。

今年 11 月,

他们发布了一份报告,

称自从他们开始
在用户中跟踪跟踪软件以来,他们的用户

数量增加了 35%。

同样,Lookout
发表了一份声明,

表示他们将
更加认真地对待这件事。

最后,一家名为 Malwarebytes 的公司
也发表了这样的声明

,称他们在寻找的时间里发现了
2500 个程序

这些程序可以归类为 stalkerware。

最后,在 11 月,
我帮助发起了一个

名为 Coalition Against Stalkerware 的联盟,该联盟

由学者、

在当地做这类事情的

人(帮助人们摆脱亲密伴侣暴力的从业者)

和防病毒公司组成 .

我们的目标是让人们
了解这些程序,

同时
说服反病毒公司

改变他们围绕
这个非常可怕的软件的行为规范,

以便很快,如果我站在你面前

和你交谈 关于明年的这个,

我可以告诉你问题
已经解决了

,你只要
下载任何杀毒软件


它就能检测到跟踪软件是正常的。

那是我的希望。

非常感谢你。

(掌声)