Blog Layout

New Stalkerware Tracks The Location Of Its Victims

sccomputerguys • Aug 19, 2021

A startling revelation was made at the recent Black Hat cybersecurity conference in Las Vegas, Nevada.

The ongoing pandemic has given rise to a new threat named Stalkerware. It is defined as apps (both malicious and mundane) that are being used increasingly to coerce and control individuals.

Stalkerware is used mostly by one intimate partner against another which makes it markedly different than conventional hacker-dominated malware strains. The trend has become so pronounced over the last year and a half that it earned a prominent mention at the Black Hat convention.

The recently formed Coalition Against Stalkerware defines this subset of software as any app or program that allows one individual to remotely monitor the whereabouts of another without that person's explicit, persistent consent. This definition includes a number of completely legitimate monitoring applications available for both PCs and mobile devices used in a manner that the publishers did not originally intend.

Consider an application that allows an employer to monitor an employee during the workday. Or consider an app that allows a parent to monitor the location of their child. These could easily be misused by an abusive spouse or romantic partner and the stealthy nature of such applications makes it difficult for the person being stalked to realize they are being monitored.

Many of the applications in question are completely legitimate and this isn't an issue that can be solved or resolved by security patches or bug fixes. The functionality that allows one individual to stealthily track another is baked into the design and is part of those apps' core functionality. That makes most certain applications and monitoring devices (home security cameras being another example) ripe for abuse.

No one is denying the need and usefulness of tracking applications. There's a definite place for them in the market. Unfortunately relatively little thought has been given to what happens when such technology is misused and that needs to change.

By sccomputerguys 22 Jul, 2022
Do you own one or more of the following products made by Cisco? The RV110W Wireless-N VPN Firewall The RV130 VPN Router The RV130W Wireless-N Multifunction VPN Router The RV215W Wireless-N VPN ...
By sccomputerguys 21 Jul, 2022
Do you use Microsoft Teams?  If so, you'll be thrilled to know that the Redmond Giant is continuing to pour resources into improving the software with a specific focus on audio and ...
By sccomputerguys 20 Jul, 2022
Corporate branding can be worth its weight in gold and certain images are absolutely iconic.  The Golden Arches, the Nike "swoosh," and Apple's Apple all come to mind. Logo images give companies ...
By sccomputerguys 19 Jul, 2022
Remember the Heartbleed scare we had a couple years back?  It was a nasty side-channel attack that was somewhat exotic and difficult to pull off, and it was absolutely devastating and sent ...
By sccomputerguys 18 Jul, 2022
Microsoft Exchange servers are once more in the crosshairs of hackers around the world.  Most recently, hacking groups have been specifically targeting them to deploy BlackCat ransomware. As is common among ransomware ...
By sccomputerguys 16 Jul, 2022
If you grew up in the days before the internet, it's absolutely staggering to think of all the ways that mobile technology has changed our lives (and mostly for the better). Remember ...
By sccomputerguys 15 Jul, 2022
It may seem as though Internet Explorer is the browser that will not die, but according to Microsoft, it is now a step closer to breathing its last virtual breath. Microsoft has ...
By sccomputerguys 14 Jul, 2022
If you're involved with IT Security at any level and if your network includes Linux servers, keep a watchful eye out for the new Panchan botnet. It first appeared in the wilds ...
By sccomputerguys 13 Jul, 2022
These days, companies spend significant sums of money to protect themselves from cyber criminals.  The threat matrix is vast, and attacks can come from almost any quarter. That is why many companies ...
By sccomputerguys 12 Jul, 2022
Do you receive healthcare of any kind from Kaiser Permanente?  If so, be aware that they recently published a data breach notification indicating that an unidentified attacker accessed an email account that ...
More Posts
Share by: