9/28/2023 0 Comments Psiphon 3 for chrome![]() ![]() ![]() This brief note describes the implant’s appearance and behavior, then explains how to obtain and verify genuine copies of Psiphon 3. For example, in June 2013 we published a report describing how attackers had maliciously modified the proxy software Freegate. Interestingly, this is not the first time we identified a malicious repackaging of circumvention programs in the context of the Syrian conflict. This is likely part of a targeted attack against the Syrian opposition by a known actor, not all users of Psiphon. When executed, the implant communicates with a Syrian Command and Control server. The malware contains both a functioning copy of Psiphon, and the njRAT trojan. In the past 24 hours, we have identified a malicious repackaging of the Psiphon 3 circumvention tool. The Citizen Lab developed the original design of Psiphon, a censorship circumvention software, which was spun out of the lab into a private Canadian corporation (Psiphon Inc.) in 2008. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |