GithubHelp home page GithubHelp logo

stalkerware-indicators's People

Contributors

besendorf avatar iam-py-test avatar j04n avatar jbrinksmeier avatar jcoscia avatar jvoisin avatar kpcyrd avatar rafiot avatar t145 avatar te-k avatar u039b avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

stalkerware-indicators's Issues

Incorportate and augment tinycheck's IOC

We should check what domains are present in Tinycheck and missing in our ioc file, and augment the later with the former.

curl https://raw.githubusercontent.com/KasperskyLab/TinyCheck/main/assets/iocs.json |  jq '.iocs[] | select (.tag =="stalkerware" ) | select (.type=="domain" )

Change the license

Switch to CC-BY-SA, and add some text explaining that if the license is problematic, please do reach out, we're happy to figure something out.

appspy

Hi @Te-k
Please look carefully at line 148 "www.appspy.com" in file "network.csv".
Looks like a mistake was occurred because domain appspy.com belongs to a Online News/Magazine of Steel Media Ltd.

change IOC on ip format ?

Hello guys, I'm victim of espionage and I'm trying to find some clue. Because I know I'm spied but I haven't found anything on my devices (pc and phones). In my opinion it's something of very sophisticated and could be something life a file-less tool. For file-less I mean something that is not installed on the disk but it's resident only in ram. The the pc can be infected everytime I connect the browser to the net.
Anyway, my problem is that, as I can see all the IOC are in the domain format and not ip. I installed a raspberry with suricata and default free rules but it's not connected to the internet. It's just connected to the mirroring port of the switch, the ethernet port is just sniffing the traffic but can't resolve any domain. Then I'lll try to resolve the hosts file in the ip format but I'll do that from the infected machine after that I'll copy the files in the suricata rpi.. so if you're interested I'll send you the converted files... but to be honest maybe would be better if this work will do by someone else.. or I'll try to write a script to convert all the files and I'll send u the script..

Regarding `tr.appmia.com`

We at My Privacy DNS have imported this domain from your source some time ago, and today I was walking through the lists unmanned #Spyware domains and this come up https://0xacab.org/my-privacy-dns/matrix/-/issues/89838 But when I'm visiting the domain it look like it is taken over by parkingcrew.net: https://0xacab.org/my-privacy-dns/matrix/-/issues/20936

The question is, why did out bot through it back at me, saying it not a Pirated domain?? do you happen to know something I don't?

Reach out to potential users

We might want, once #70 if closed, to suggest the use of the IOC to the following entities:

DNS

IDS/XTR/…

MISP-based things:

Forensic tools

Threat Intel

(Mobile) anti-viruses

Many anti-viruses are flagging stalkerware

Others

Add iOS application names for potential stalkerware/tracking apps

I'm using these indicators with MVT and they are very helpful! These indicators work well for detecting potential surveillance/stalkerware software links in chat and browser history but I've realized that they don't detect that these flagged apps are actually installed.

My process now is to check manually for risky apps if we see an alert for one of these domains. It would be great to collect and add the application names for relevant iOS apps to this IOC list. Here are two examples from Life360 an FindMyKids.

com.wheremychildren.ios
com.life360.safetymap

Thanks for your working putting this IOC list together!

how can ioc.yaml be used

Please could you provide instructions on how to use ioc.yaml?
In a blog post check_apk.py file is mentioned, but seems no longer belongs to the repository. :-(

Adding new IOCs

Hiya @Te-k and thank you for this amazing repo that you guys have put together and are constantly maintaining. I have a few malicious Android stalkerware APKs how do I add it to the IOCs in any of the formats that are there in the generated folder.

Publish github pages

It would be nice to make use of github actions to generate webpages out of our ./vendors folder, and enrich them with:

  1. Hosting provider
  2. Google Analytics Tags

A bunch of new indicators

Hi @Te-k and thank you for your awesome work.
By taking your indicators (list of hosts, IPs) as input, I scripted a search on ApkLab and have extracted both packages and certificates of apps communicating with specified hosts.

Here is the JSON dump.

Decide what we want to do with regard to websites vs. C2

Currently, we're tracking different things network-wise:

  • C2
  • Websites
  • C2 that are also Websites
  • IP Addresses, that are C2, websites, and sometimes both

Are we ok with this state of affairs? Either way, we should document what we're tracking network-wise, to avoid surprising netops/partners/users/…

Tasks :

  • Update the README to clarify what we consider stalkerware
  • Update the README to clarify what we include in network indicators and different files
  • Migrate network.csv to network.yml
  • Include information on C2/website in network.yml
  • Update generation scripts, include a network.csv file for readability

comparing two snapshots as stalkeware indicators

Let's assume that you own a phone that is under surveillance.
If you do a factory reset, after a few days the mobile is compromised again.
All stalkeware tools fail.
You are nearly sure your organization is using a surveillance provider with zero-day exploits, probably SMS ones.
You can root the device to ls all files with date and size.

Would be useful to compare two ls snapshots, first once device is reseted, and second after a couple of weeks?
What advice will you provide to do that?

A couple of missing ones

I currently don't have samples for all of them unfortunately.

Linter

Add scripts to:

  • check formatting
  • check that the YAML keys are coherent (website instead of domain, missing tag`, …)
  • warn on duplicates
  • check that stalkerware names in the IOC are present in the README as well

Improve management of generated files

Having an action pushing updated generated files creates problems with forks and PR, how can we improve that?

Maybe a git pre-commit hook + a daily option?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.