Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Censorship Communications Privacy Security The Internet Your Rights Online

Backdoor Found In Hacked Version of Anti-Censorship Tool Simurgh 32

wiredmikey writes "Simurgh, a privacy tool used in Iran and Syria to bypass Internet censorship and governmental monitoring, is being circulated with a backdoor. The compromised version has been offered on P2P networks and via web searches. Research conducted by CitizenLab.org has shown that the malicious version isn't available from the original software source, only through third-party access, so it appears that Simurgh has been repackaged. The troubling aspect of the malicious version is that while it does install the proxy as expected, it then adds a keylogging component, and ships the recorded information off to a server hosted in the U.S. and registered to a person in Saudi Arabia. In response to this attack, the team that develops Simurgh has instituted a check that will warn the user if they are running a compromised version of the software. At present, it is unknown who developed the hijacked version of Simurgh, or why they did so."
This discussion has been archived. No new comments can be posted.

Backdoor Found In Hacked Version of Anti-Censorship Tool Simurgh

Comments Filter:
  • by girlintraining ( 1395911 ) on Thursday May 31, 2012 @01:11PM (#40169055)

    Censorship is ultimately about breaking trust networks. Pro-censorship governments almost always want the citizens to trust them above all other sources. Cryptography, anti-censorship proxies, and other communication mediums provide an external point of view. This is only dangerous to governments that aren't telling the truth -- in which case, their reaction to such communication mediums is from an understanding of how much that trust would be damaged if word got out about what they're really doing. What this means is, it's obvious that such a government would poison pill any alternatives by making them appear (or interfering with them in such as a way as to cause them) to be untrustworthy. The malware may or may not have been released by the government; It's doubtful we'll ever know the truth, but it is obviously in the government's best interests to damage the reliability of any kind of 'bypass' software.

    Disclaimer: Many governments, including those who claim to be "free" engage in similar behavior. Your government is not exempt from this behavior.

  • Re:Pffft !! (Score:4, Informative)

    by John Hasler ( 414242 ) on Thursday May 31, 2012 @01:30PM (#40169319) Homepage
    That's bullshit. The Register [theregister.co.uk]

If a train station is a place where a train stops, what's a workstation?

Working...