Download presentation
Presentation is loading. Please wait.
1
The Hacking Suite for Governmental Interception
Remote Control System The Hacking Suite for Governmental Interception Milan - 23/08/2013
2
The Building Blocks
3
Remote Agent Secure Frontend Scalable Backend Infection Vectors
4
Complete solution, not a toolkit Totally developed by us
5
Remote agent Your personal 007
6
Internet Desktop installation Mobile Installation Working offline…
Then send data.
7
What can we collect?
9
Camera Messages Chat Microphone Contacts Calendars Calls Location
Keystrokes Documents Passwords Visited websites And much more… Social -> calendar + contacts
10
Runs on an event-driven logic
Autonomous
11
Events Actions When crossing the border Every day at midnight
On hidden SMS On voice call Actions Start microphone recording Destroy the device Send collected data Take a camera snapshot Social -> calendar + contacts
12
Many different events and actions Combine them to suit your needs
13
What if my target is security aware?
14
Invisible to target user Invisible to antivirus and anti-rootkits
Anti-forensic measures Resistant to format and restoration
15
Evidence on remote device
How can we collect it?
16
Firewalls and proxies are passed through
Internet connection Firewalls and proxies are passed through
17
Open and saved networks
WiFi Open and saved networks
18
Avoid billing the target with custom APN
GPRS / UMTS / 3G+ Avoid billing the target with custom APN
19
Where can I install the Agent?
20
Enough of features. Let’s see on what devices you can operate the RCS
Enough of features. Let’s see on what devices you can operate the RCS. On Windows for sure, so 90% of the desktop market is covered.
21
Secure Frontend An invisible barrier
22
Agent is connecting to your servers Your identity must be kept secret
23
Let’s say we have RCS in one country…
And the backdoor in another… Suppose you control a number of server around the world. You may think of forwarding the traffic…
24
Configurable on-the-fly Evidence stays encrypted
25
Scalable Backend Your data vault
26
Scalable by design
27
Agents x 300 Collector Database
28
Agents x 10000 Collector 1 Collector 2 … Collector N Database Shard 1 Shard 2 … Shard N
29
Adding servers is transparent Load balancing is automatic
Scale when you need Adding servers is transparent Load balancing is automatic
30
No database administration required Set & Forget backups
Fast restore in 5 minutes
31
Be informed on interesting events
Real-time alerting Be informed on interesting events
32
Polished graphical console The whole system from a single point
33
Infection Vectors Deploy your forces
34
How can I deploy my agent?
35
When the target opens a document
36
0-day exploits pack Always up to date
37
While the target browses the web
38
Inject into downloaded applications
Inject into web pages
39
Bob’s laptop Internet Web site Network Injector
40
Send your target an SMS
41
And many more…
42
Third-party Integration
Combine your weapons
43
Easily integrate with your monitoring center
44
Demo time!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.