MiniPanzer and MegaPanzer
A screenshot of the software MiniPanzer showing some of its configuration settings | |
Original author(s) | Ruben Unteregger |
---|---|
Initial release | 2009 |
Preview release |
0.1
/ 17 February 2016 |
Development status | Unknown |
Written in | C++ |
Operating system | Windows |
Platform | x86 |
Available in | English |
License | GPLv3 |
Website |
sourceforge |
MiniPanzer and MegaPanzer are two variants of a Bundestrojaner (German for state-sponsored Trojan horse) written for ERA IT Solutions (a Swiss federal government contractor) by software engineer Ruben Unteregger, and later used by the Federal Department of Environment, Transport, Energy and Communications (UVEK) to intercept Skype and more generally voice over IP traffic on Windows XP systems.[1][2]
The source code of the program was released under the GNU General Public License version 3 (GPLv3) in 2009 by their author, who retained the copyright.[1] Thereafter, the trojan was apparently detected in the wild.[3] One of its designations given by anti-virus companies was Trojan.Peskyspy.[4][5]
References
- 1 2 "Swiss coder publicises government spy Trojan - Techworld.com". News.techworld.com. Retrieved 2014-01-26.
- ↑ "MegaPanzer: Parts of Possible Govware Trojan Re...". Linux Magazine. 2009-08-28. Retrieved 2014-01-26.
- ↑ Zetter, Kim. "Code for Skype Spyware Released to Thwart Surveillance | Threat Level". Wired.com. Retrieved 2014-01-26.
- ↑ "Trojan.Peskyspy—Listening in on your Conversations". symantec.com. Symantec. 27 Aug 2009. Retrieved August 30, 2016.
- ↑ Danchev, Dancho (2009-08-28). "Source code for Skype eavesdropping trojan in the wild". ZDNet. Retrieved 2014-01-26.
Further reading
- Bundestrojaner: A programmer speaks out Interview with the author on gulli.com
External links
- Official website SourceForge, source code
- MegaPanzer SourceForge source code
This article is issued from
Wikipedia.
The text is licensed under Creative Commons - Attribution - Sharealike.
Additional terms may apply for the media files.