To help malware analysts and security researchers overcome FinFisher’s advanced anti-disassembly obfuscation and virtualization features, ESET researchers have framed some clever tricks into a whitepaper, “ESET’s guide to deobfuscating and devirtualizing FinFisher”.
As we reported in September, in campaigns we detected in two different countries, man-in-the-middle attacks had been used to spread FinFisher, with the “man” in both cases most likely operating at the ISP level.
FinFisher has extensive spying capabilities, such as live surveillance through webcams and microphones, keylogging, and exfiltration of files. What sets FinFisher apart from other surveillance tools, however, are the controversies around its deployments.
<h3><a class="wls-article" href="https://www.welivesecurity.com/2018/01/23/guide-makes-possible-peek-finfisher/">ESET’s guide makes it possible to peek into FinFisher</a></h3><a class="wls-link" href="http://www.welivesecurity.com" target="_blank" >BY WELIVESECURITY.COM - security news, views and insight from ESET experts</a></div>