Advertisement
UK markets closed
  • FTSE 100

    8,143.21
    +64.35 (+0.80%)
     
  • FTSE 250

    19,818.47
    +216.49 (+1.10%)
     
  • AIM

    755.54
    +2.42 (+0.32%)
     
  • GBP/EUR

    1.1663
    +0.0007 (+0.06%)
     
  • GBP/USD

    1.2460
    -0.0051 (-0.41%)
     
  • Bitcoin GBP

    50,977.95
    -77.66 (-0.15%)
     
  • CMC Crypto 200

    1,324.49
    -72.05 (-5.16%)
     
  • S&P 500

    5,096.56
    +48.14 (+0.95%)
     
  • DOW

    38,174.51
    +88.71 (+0.23%)
     
  • CRUDE OIL

    83.94
    +0.37 (+0.44%)
     
  • GOLD FUTURES

    2,344.70
    +2.20 (+0.09%)
     
  • NIKKEI 225

    37,934.76
    +306.28 (+0.81%)
     
  • HANG SENG

    17,651.15
    +366.61 (+2.12%)
     
  • DAX

    18,162.33
    +245.05 (+1.37%)
     
  • CAC 40

    8,094.69
    +78.04 (+0.97%)
     

Microsoft says Austrian firm behind spyware targeting law firms, banks

FILE PHOTO: A Microsoft logo is seen at a pop-up site at Roosevelt Field in Garden City

By James Pearson

LONDON (Reuters) - Security researchers at Microsoft have said an Austrian firm was behind a string of digital intrusions at banks, law firms and strategic consultancies in at least three countries.

The firm, DSIRF, developed spyware - malicious software designed to spy on or steal information from a target's device - called "Subzero" which uses so-called Zero-day exploits to access confidential information such as passwords, or logon credentials, Microsoft said in a blog post on Wednesday.

"Observed victims to date include law firms, banks, and strategic consultancies in countries such as Austria, the United Kingdom, and Panama," the post said, without identifying the victims.

ADVERTISEMENT

Vienna-based DSIRF, or DSR Decision Supporting Information Research Forensic GmbH, did not respond to email and telephone requests for comment.

Zero-day exploits are serious software flaws of great value to both hackers and spies because they work even when software is up to date.

The term comes from the amount of warning users get to patch their machines protectively; a two-day flaw is less dangerous because it emerges two days after a patch is available.

Some cybersecurity firms develop such tools to deploy alongside routine "pentesting", or penetration testing, to test a company's digital defences against malicious attacks.

"Microsoft's interaction with a victim confirmed they had not consented to red teaming and malware deployment, and confirmed it was unauthorised activity," Microsoft Security Unit general manager Cristin Goodwin, who authored the report, told Reuters.

According to a copy of an internal presentation published last year by German news website Netzpolitik, DSIRF advertises Subzero as a "next generation cyber warfare" tool which can take full control of a target's PC, steal passwords, and reveal its location.

Another one of the slides in that presentation showed several uses for the spyware, including anti-terrorism and the targeting of human trafficking and child pornography rings.

Microsoft's findings come as the United States and Europe mull tighter rules around vendors of spyware, a fast-growing and under-regulated global industry, and after the Pegasus spyware developed by Israel's NSO was found to have been used by governments to spy on journalists and dissidents.

"This industry appears to be thriving," Shane Huntley, Senior Director of the Threat Analysis Group at Alphabet, told a U.S. House of Representatives committee on Wednesday.

(Reporting by James Pearson; Additional reporting by Zeba Siddiqui in San Francisco; Editing by David Holmes)