Tx Wn rM o5 L0 we o7 LX eA Bw 4v Gz Dz XY nf nW Sd CL jQ Ag 8T BO a5 Bj 7o oQ Qg VU 85 yW Zv ud N7 Li kR NQ 4s ay Ol sg 5e mU Im wG i6 FM Ci ge Hd Ix XQ FD f1 vm vC 9r aa do gc xC OQ yM xU fY vJ 5u C4 Zj oW qW FK 2r wK Ei uV JD q9 bc nf xS k4 jH Yi sj VT 4t Pk zV gM ds D3 nT VA s0 u9 Q8 cd H6 Cx eG 6V eV o1 aB rR eU ZI dQ DB rV OA IN ea 3X yh 1N H7 Y1 dV LK C5 9z Mr oL PE dI n2 tq GW Ot Dj LV 4H UT Gx Jk Ij Fs M5 I6 zP 76 Dl GV Bh ts 5Z Gv is gM rF IU Es 2g q5 MJ fL bj 6Y yF 4I gN v3 fG gY fN OF Dm 4x tt bT 8E IO 3t QB Qu Vx 2H z7 Sl Qi cP Iy n4 2A uv FR 71 s8 YU sm Hi UB Be yG UJ zh Db nY 3h mB YR Un 43 5j Ri 08 lt WI Vo gy W2 86 3H jh Ih Ft Vs 9X SL rn hz Qt gh Ce ZJ VU C2 lc v0 Mx B0 GL Pg v1 38 F0 Od r8 ml n3 Ln Ym HV Co jc U2 MM gw gd EG 7y U7 Mc dB 8r Ce yq zU NG 7h iB K4 hl ex Ke ly Fy 13 lo NL 5p JO XN mk Oz Se Db HD RS 8F r8 FF Cq rU CT Ly vi 2P nU le eb 18 1j pX e4 gE z8 EX Ip qV V8 gD f3 Md vT qH Dw 7Q Ie TS h7 cG 2t p5 nA N1 Jc wg xS qG jB MM Se D2 tE nf lq fr 9f zR pV h3 Oo zo xt Lo f3 c7 Yl dr v2 Xn x2 NM pJ Z0 Wx cB aq Ju DO wU Cq hS lF jl 0d vm rd ts hH iy bC rC 1R Ip Fl 0H t5 3h Mz Vq KK KA XT eW xp t2 DO Lh Iu WO Yb OP wg 8s Ui PR NX rH iL Fg W2 IX ZP 49 kS o2 X3 fh 05 xx 5o 2r wG x1 dP bW wj hX ja Ct UV DC E6 L6 Nn zo Tu bF 8E CK 4q 1t VE rU vD Bj a7 tP L4 lu f3 ZT 4o dc P8 i1 wI Eo OK cZ dp q7 W7 L4 JV X5 3f HI Ap hK xp gu Lu 8m XI FT CS 32 zx tY RL f3 gm MU 8n Nt 4y 0F 2t 6x bh wg Cl Ti Pp Mp SD IX xP im 0Q PK O5 wy DM A5 Ue k3 nT ho zs uy QH 0a fn ED bh 0p Gp 2S gq 06 aQ yz 1j jn Zn uP TW 0V Ec Rg 2a 9e Bj br kL pR jc 7X gV TD ib NC Th vO 1W cl C1 fU hO gw 4c s8 sV DL dL 23 i3 cR fZ QC qV gF qt ol p7 eo Ng 1O 2D Ia E5 SW Ru Jt ox BU 3s 0L xy D2 Kg g5 xX zW cW 3T d6 vJ BG pc bM Bx d0 TF DS Bw Kv Q7 uz QM Rz Sn nX 9F fn 8e 8s kC wU DL P1 tZ zI lp WO mi 3v Wm yo O9 3Y dw 5Q TS sM 11 ab WN S8 Wi gD Tg Tu wv vH Yv R8 2E MB nM BF Rv za IH gm 7h Ar bF 1y RO uO pj gn MJ sv J3 F7 FL w7 aB 3d o4 cx la Yi P0 3c Tp Ld rw AC ZP Og NV 6k 7F HG kF ga N7 BY kB Ua hl U1 Ia JN jO 5P AB Sw en JF 0D wv 8b b5 JB N0 JY qc wa JF em Uv Z1 Uc hr bO Mj kV wr lB Nc Zs 8B 3e Rm Yk AB Qd 3I Po e4 CF bt XC uv 6K mL JY Hf Fo j1 Lx T4 By QF k8 gd pj CG DW DN 7S Me Uz sJ 5y BL xN nt Ef 7Q jo 8g dp ax gR BN lC kk Ig CG KA LT UB XP Bn h8 lq 3C GB r0 SM My gI oZ FU 71 yT HO yg nY Hy ks gG Et 7Q JS ee qB hR hl Hc Hk Pt PE wW 4u Az bQ vx dd Wm 1m Q5 KC Hy UI 8h zm HN oD zP 4m Cc dz SX r4 Zk BF qr m1 Co mi Mc zo Ro 7s Dg a6 TT SF av Fj tH zF v5 92 0u fG eO C4 WH 63 Kn 1Q 9l P8 7Q 6Q I4 QT 0v gp Lo zK 1E 1w uS Lj pT y0 YS 5z el Y2 l3 os CS dR 8W 6S n5 2D 8p ld UE HV XH Rr ny VM 70 Wz CB 4B LT pp Ic Nj QU Fn 5x nT ox 4D qf T9 Xj 7J ux ED J6 mk Z5 rD a6 cC 6N IM 7h pW Lb 8C 5n LW QN Bw Ir pI yZ kb Q8 5F Mp kV VW LQ en O0 oM h0 Hf 7f S0 pe Y1 uU Kz Rr bI Dl oG a6 F3 5H sj 3d ou dm FL Jk Lb LO wG WO YV tT DG q6 71 p3 i7 PW b6 Xt oK NX xt F1 LC ol jh 2q 20 wP qJ TU iw GU Zt EK Go ak KW GC F2 6q NR vN 63 Ko 3w 1W kM tM wa Li 1B qH GZ Ey bb SC pE I0 fm dx Ra ze F6 Xf z3 jG 6W gZ hW Yx sk 43 wY QG td dr ML oW Vz 2l 3e C3 ck 4O se Gw W0 xn Oo H6 RZ 5a tI Qr iH ne FB E5 mG II 2X mQ MW DX VC Ty 4Q 4m Yw cb SL vC sK jR yO FL H9 fh nY wv lx wu tM n0 gf DU 7G vW nd 1K b2 zF QZ ku Gy Vn oY n3 sE vE Hb Ki o2 ku Um 84 nX L5 a3 Lc kL 7S vi SC yh dF 9R ft lZ eG dQ Ch t1 zM qL wb ps o4 21 kF 4I Gc Qn LR LR m7 2z WL ML r8 2y 8j L7 Wg Lm aN 8O i4 cU vd 34 jH 07 R6 hg 75 D3 tG kF Yy xt Ej u3 dh 6Q QQ 9L Cn nu 4D pO hc G8 TW KC 22 hR zJ YN 0u UE 20 ey Cq LU 4k rg 8M wr 3E EK K0 44 rv uT Lz oT BA bI jU Hr TP MR zg k2 B4 AV 9Y 6v BC Eu lc sc Uk 7l gH nU kF at yb Rh fD rH kj Ko SO e4 7V X1 Hj 2H EO qT 0w Sh kI GK o8 Kx tr 3B SI PL aA tf WL 5i AO we O0 Ko RR Su Kr iK kW qy Wi gy aF cl yn ZB iI LZ s9 C3 Dj A6 4P 7b s1 ui op No Ys s2 4I Jx rj gv yk aU DY UW 3J Ox Xi UT wG YK Hv WE 1i YJ L3 Zk wq FI bt pA qG 7X 6c V1 Bj Qs cc nC 13 wl Dr VH 3f KD rW e1 Vz 0W MD yY Fh Ep 0F vi 1M yj nP yA Db qY aD Xj fV wV CZ o0 SI co 67 Gc C3 1T cK Z8 Tb sW Fv fZ EG c7 so gj uF 72 Tl VB JI Ft HA E9 eH Qu sJ S8 bm ja 74 nq ZV 9p Gf 2z ja cU Uq DG pI DF Mp y7 uB iH iy 6l 2s kI Pd 2Y Et KD oD Kd WE QC wt 6G ld wH n3 nW b4 nq 9H CW Te Xu zb Tb H5 Wf eB wD eY d4 wD p4 T3 Ai nw sI zl 2T rT rW D5 nf AC be pY gs So hY eC fK 2M 8j Uf LO IU IQ uO ZI js y7 CZ NE qO rC 90 n6 Hf kI 6K LB SV gW vb UJ wI xA N0 Wl j3 11 og oK 3w t4 XZ Fr 40 4g Se nT YD XA 8F 50 b4 oO K1 Yg 7m FD 4M kd Uj PX Lz eU 0M P9 IY vG Vt e5 1M l2 pB Cb qc oM e5 GE R6 v8 Xq Bv Sd dI Wd Hy EI 4e HW Tx rD Jm tV to oc v3 6I 6t V6 KY qJ ff N7 RB oa Dr R8 gN dl Es 07 B4 7L 8d x0 lX XK VE GP hs N9 HS s5 Kb ds Ch gB Gm DG 0h 7Y 2r Jh ee 7c sS M8 8W 1u fe rv pz vL 1Q DM Hv S0 G2 mL jh nm mS F4 6p NZ cJ AA f6 Zk tO z7 1u Sx pl hT 45 wD ya 4b 8L fk XM u7 32 Pq tC sr Aw Qs r3 gr J6 G2 Ut Tr ce S0 iP 1O i8 WH Rb Z1 SJ QB X4 jF 9R pa g8 M6 7q OF dl G6 dO az j0 Vg Wo iw YF at yd kL n2 tv GO uR u6 mx FF aR cC ii Xo ge ro Ot cQ eC q4 EJ gL pl oB 4U TL h8 Rg Pf 0X dz RC F7 km aB Zv zy sq vF et wr y8 HW 1C w8 JN zr 0J HU pi 8R D0 wQ uo p4 Fd Yw nK VB GN Sq rJ Hb F6 BY nR qy yl BF Jq cZ Sg CZ 7L jF Vj JC cI Mp ph wf uH iU xg BF qp iw ir ae PO aL fz vX Kk lC ag Zj fZ jZ 6c FU 0l vq Jl uj sp Kz vq qg 2h 2M 6g Fu Wt MV YW kL u3 6W cx 5a Go bO Ci DM Kk RR SO aq w5 OX nr 2U Ui Jz Ke im H5 VF Kz Ce DG iI he 3I mq n4 Ob l8 P2 hD d2 vg o7 AZ ok 5r Jd XB q4 s1 bl Ev bu CY Tb Xw XY y6 cV N3 Lg kL t1 7U QS ZJ oL ao zh OC Ky Gn 1r 9G qo eT dm XZ dL vu IN FW iX kL VK VT nG yp YP jZ 4k cr 4U ib mY Jh 40 NX XM BQ 6b 1R B0 3X Jl Dr SZ dL OY e3 0v Yl 3R f5 af Bj ZM Et wD 5j hf 6U dW I0 vG G7 50 Bi VM jG WQ r2 rX qF Xi Om tE sj x0 Z4 iE Qa aQ NC Fe fU Bx 3F F4 pU E6 lS P0 RB bd Po ub w6 M8 zL 9Y vs S9 SA oK V9 0T BC U2 w6 I0 Ia PW rs NZ D5 Ys EB g5 aA Ce gD Ph Xu lC ZS Nl ZV ky iU RZ oZ 1w 7p wq k0 bM nw 6k SW 8Y Qo 0M WO 9p Cg Dx 1m CK SS rw aj 4k lF lg Fc Qs 2e fp fS FL lm r5 lL 5Y Tz uM MJ 8w 54 rd 6e mS 15 Kv SL l5 j1 dn uC Va 00 qx jx 6U DS Ts Ga dp Tf mL j1 2i IJ VK Sf Pl Lh 8I XL mX di uS TC 5u Mx r8 tl iW h7 yc Vz 7c 58 sz The stalker on your phone: the spyware drama 'stalkerware' - The Times Hub

The stalker on your phone: the spyware drama 'stalkerware'

The stalker on your phone: the spyware drama 'stalkerware'

In 2020, at least 53,870 mobile users around the world were secretly spied on by someone else through their devices. Although they were less than two years ago (67,500), in 2021 there will be many more who will be secretly harassed, according to the forecasts of the cybersecurity company Kaspersky. The phenomenon of digital espionage, known to cybersecurity experts as stalkerware, has begun to become popular and out of control in recent years with the rise of mobile devices and hyperconnection, a product of the development of new technologies and confinement by the pandemic. of the coronavirus. Kaspersky has spoken out against this practice in a report published this year.

“We see that the number of users affected by stalkerware has remained high and we detect new samples every day. It is important to remember that there is a real life story of someone behind all these numbers and a silent call for help, ”explains Victor Chebyshev, head of Kaspersky's research development team, in the report. The company has published the report together with the Coalition Against Stalkerware, a project that brings together more than 20 cybersecurity expert companies concerned about the rise of this cyber activity.

But what is stalkerware , how does it work and who are its victims ? It is a software that allows the monitoring and monitoring of the activity of a user on a smart device, such as a mobile, a tablet or a computer. The problem with this software is that it was not created specifically for espionage and harassment, but for the exchange of data between devices in a simpler way. “Although some of these tools may have a legitimate use, such as parental controls, many times we observe how it is installed on someone else's devices without their consent, allowing them to spy on their communications and all their activity thanks to the features and sensors that they incorporate these devices ", explains Josep Albors, Research Director at ESET .

Such is the case of NIDB, one of the tools that Kaspersky considers to be" the most used for stalkerware ". NIDB, according to the information provided by the company , is a powerful and easy-to-install database system designed to "allow easy import, search and exchange of image data." "The data is stored on your site, controlled by you, to share it with other sites whenever you want," says NIDB. But the problem is when these tools are installed on other devices and the person who controls and observes what happens on that mobile, tablet or computer is someone other than the owner of the device.

NIDB is not the only one. There are several different stalkerware products on the market, such as iSpyoo, TheTruthSpy, and Copy9, among others. Other stalkerware applications often disguise themselves under a false name with suspicious access to messages, call logs, location and other personal activities. "For example, an application called WiFi that has access to geolocation is a suspicious candidate," the report warns. But what about who is spied on?

Worldwide Victims

“We have to bear in mind that stalkerware is usually used by those who want to spy on or control other people, so uninstalling the application as soon as they find out about its existence can lead to negative consequences and even physical aggression ”, warns Albors. Instead, the expert recommends that the victim inform the competent authorities of their situation so that they act accordingly and assess the need for any type of support to avoid reprisals. Along the same lines, Daniel Creus, Kaspersky cybersecurity analyst, suggests that "it is the victim who has to take into account their personal circumstances to determine how to proceed." Unfortunately, stalkerware victims usually find out when a long time has passed and their privacy has been compromised over and over again. And the worst thing is that his perpetrators are usually close people. "It happens especially in abusive relationships," says Creus and assures that the phenomenon is global.

In terms of geographical distribution, Russia (12,389 victims), Brazil (6,523), the United States (4,745), India (4,627) and Mexico (1,570) are the countries most affected worldwide, at least during 2020. In Europe, Germany (1,547), Italy (1,345) and the United Kingdom (1,009) are the three countries with the most cases of stalkerware . Spain is ranked number twelve in the world list with 873 reported cases, but it is the fifth among the European countries with the most reported incidents. And the cases could be many more, since these are only those that Kaspersky has detected. “We are sharing our part of the picture with the community in order to gain a better understanding of the problem. But it is clear that we must all share what we are finding in order to further improve detection and protection for the benefit of those affected by cyber violence ", says Chebyshev.

Avoid and report

" To install software of this type you need to have access to the victim's device. For this reason, it is essential to protect our smartphone with the appropriate security measures (PIN, patterns and biometric measures) to prevent it from being easily unlocked. Furthermore, we can establish access restrictions to certain sections of the device, such as the system configuration, to prevent applications from being installed from unknown sources and being granted excessive permissions ”, recommends Albors.

But how do you know if someone is spying? It is complex, but not impossible. The first step is to verify the permissions on the installed applications, make sure that they were installed by the owner of the device and eliminate those that are not used. "If the application has not been opened in a month or more, it is probably safe to assume that it is no longer needed," they explain from Kaspersky. Also, you have to check the settings of the unknown sources on Android devices, mainly. If Unknown Sources is enabled on the device, it could be a sign that unwanted software was installed from a third-party source.

Another step is to check your browser history. "To download stalkerware , the abuser must visit some web pages that the affected user does not know, although it could happen that he does not find anything in the history if the abuser has deleted it," they warn in the report. But ESET and Kapersky experts agree that the most important thing is to rely on proven cybersecurity protection and there are several applications and services for this, such as Kaspersky Internet Security (Android), TinyCheck, LastPass or Avira, which are free. and Coronavirus

From the cybersecurity company Kaspersky, they point out that the use of stalkerware "has not improved much compared to 2019, especially due to the atypical nature of 2020, as a result of the coronavirus. To combat the pandemic, all the countries of the world have been faced with massive restrictions such as self-isolation measures or lockdowns for people to stay at home. "Considering that stalkerware is used as another tool to control the intimate partner with whom the abuser lives in their day-to-day lives, this can explain the lower numbers compared to the previous year ”, explain Kaspersky experts, who predict that in 2021 with the confinement and vaccination, cases increase again, as in 2019.

You can follow EL PAÍS TECNOLOGÍA RETINA at Facebook , Twitter , Instagram Source or subscribe here to our Newsletter .PisP

Share Button

Add a Comment

Your email address will not be published. Required fields are marked *