Unmasking Spyware: Global Surveillance Tools and Their Controversies
Spyware can be used for the good of the people in a lawful and balanced way, but this is not always the case.
The NSO Group's Pegasus recently gained global recognition for its advanced capabilities and misuse by certain governments. But are you familiar with the abundance of other spyware tools used by both governments and private entities?
Some are commercially available, while others operate in the shadows of state-controlled programs. Let's break down some of the known spyware and controversies so that you can remain informed and safe.
FinFisher (FinSpy)
Developer: Gamma Group (Germany).
Marketed Use: Law enforcement and intelligence agencies.
Capabilities: FinFisher is a powerful tool that enables governments to spy on communications, intercept data, track locations, and record activities like keystrokes or voice conversations. It is highly sophisticated and can be deployed on mobile phones and computers.
Controversy: There have been reports of its use against political dissidents, journalists, and activists in various countries.
Hacking Team’s Remote Control System (RCS)
Developer: Hacking Team (Italy).
Marketed Use: Government surveillance.
Capabilities: RCS can infiltrate computers and mobile devices, steal files, capture screenshots, record audio, and monitor emails and instant messages. It can also bypass encryption protocols.
Controversy: Hacking Team’s tools were sold to governments, which reportedly used them to suppress opposition. In 2015, the company itself was hacked, and its internal communications revealed that it had sold spyware to oppressive governments.
Candiru (Sourgum)
Developer: Candiru (Israel; also known as Sourgum).
Marketed Use: Governments.
Capabilities: Candiru reportedly sells highly advanced spyware to state actors. Its tools are believed to be capable of hacking and compromising computers, mobile phones, and cloud accounts, granting access to personal data, messages, and more.
Controversy: According to research by groups like Microsoft and Citizen Lab, governments have used Candiru's spyware to target journalists, political opponents, and human rights defenders.
Predator
Developer: Cytrox (Israel).
Marketed Use: Government agencies.
Capabilities: Cytrox is known for developing Predator, spyware with similar capabilities to Pegasus, including the ability to intercept communications, access personal data, and remotely activate a device’s camera and microphone. It is believed to be less sophisticated but still potent.
Controversy: The spyware has been linked to several cases in which governments used it to monitor political opponents and journalists in Europe and the Middle East.
Zero-Day Exploits (Custom State-Sponsored Malware)
Developer: Often internal government agencies or state-sponsored contractors.
Marketed Use: Internal intelligence and security services.
Capabilities: Some governments, notably the United States, China, Russia, and Israel, maintain their own offensive cybersecurity teams or subcontract specialized firms. These groups develop zero-day exploits—vulnerabilities unknown to software vendors—that can be used to infiltrate systems, conduct surveillance, or even sabotage.
Controversy: Governments have been known to stockpile zero-day vulnerabilities, sometimes leading to massive breaches when these exploits are leaked or used maliciously (e.g., WannaCry ransomware using an NSA-developed exploit).
DarkMatter
Developer: DarkMatter (UAE).
Marketed Use: Government agencies, specifically Middle Eastern governments.
Capabilities: DarkMatter provides sophisticated cyber-espionage tools to clients, particularly in the Middle East. These tools allow phone tapping, social media monitoring, and access to secure communications.
Controversy: DarkMatter has been linked to cyber surveillance programs within the UAE, where government opponents and foreign nationals have been monitored using its services. There have also been allegations that former NSA and Western intelligence contractors have been involved in building these tools for UAE authorities.
Project Raven (Karma)
Developer: A UAE-led surveillance program.
Marketed Use: Internal state use.
Capabilities: Project Raven (with its tool Karma) was designed to exploit iPhone vulnerabilities to spy on government opponents. The exploit allowed operators to access texts, emails, and location data.
Controversy: In 2019, former U.S. intelligence officers who worked for the UAE revealed the program’s details, which led to global condemnation and scrutiny of governments hiring ex-Western intelligence operatives.
Wolf Intelligence
Developer: Wolf Intelligence (Germany).
Marketed Use: Governments, intelligence agencies.
Capabilities: This spyware is marketed for use by law enforcement but has capabilities that allow for total surveillance of mobile phones and computers. It can intercept calls, SMS, and even end-to-end encrypted communication.
Controversy: Like many other companies, Wolf Intelligence was implicated in selling its spyware to authoritarian governments. Its CEO was also arrested on charges of hacking and illegally selling surveillance tools.
Common Themes in Government-Controlled Spyware
Many of these tools operate under the pretence of fighting terrorism or aiding law enforcement, but they are often used to target opposition figures, journalists, activists, and dissidents. The complexity and secrecy behind such tools make it difficult to pinpoint who exactly is using them and how. These programs are generally:
- Highly sophisticated: Capable of bypassing encryption, remaining undetected, and extracting detailed information from targets.
- Expensive: These tools often cost governments millions of dollars and are generally inaccessible to the general public.
- Legal gray areas: These tools are often sold under legal agreements, though they can be abused in the wrong hands.
Some spyware is officially sanctioned and developed in-house by government agencies, while others are sold under the guise of lawful surveillance for criminal investigations but later misused.
Spyware and surveillance technology will continue to evolve, raising concerns about privacy and human rights, especially as governments seek more powerful tools to control information and dissent.
Do you suspect that unlawful Spyware and surveillance technology target you or the organisation you represent? Contact the author Henrik Kindstedt today for a consultation regarding short- and long-term remedies.