CINXE.COM
FinFisher - Wikipedia
<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>FinFisher - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"39dbde3f-09a3-43d1-8990-0a97c2ba1492","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"FinFisher","wgTitle":"FinFisher","wgCurRevisionId":1256012567,"wgRevisionId":1256012567,"wgArticleId":33894169,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["Webarchive template wayback links","CS1 German-language sources (de)","CS1 Arabic-language sources (ar)","Articles with short description","Short description matches Wikidata","All articles with dead external links","Articles with dead external links from April 2019","Commons category link from Wikidata","Official website different in Wikidata and Wikipedia","Computer security software","Spyware","Computer surveillance","Trojan horses","Espionage techniques","Espionage devices", "Malware toolkits","2012 in computing","Computer access control","Cyberwarfare","Espionage scandals and incidents","Content-control software"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"FinFisher","wgRelevantArticleId":33894169,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":30000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition": "interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q12432991","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES =["ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&only=styles&skin=vector-2022"> <script async="" src="/w/load.php?lang=en&modules=startup&only=scripts&raw=1&skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&modules=site.styles&only=styles&skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Finfisher_spyware.jpg/1200px-Finfisher_spyware.jpg"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="616"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Finfisher_spyware.jpg/800px-Finfisher_spyware.jpg"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="411"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Finfisher_spyware.jpg/640px-Finfisher_spyware.jpg"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="328"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="FinFisher - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/FinFisher"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=FinFisher&action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/FinFisher"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-FinFisher rootpage-FinFisher skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page's font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&returnto=FinFisher" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&returnto=FinFisher" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&returnto=FinFisher" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&returnto=FinFisher" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Elements_of_the_FinFisher_suite" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Elements_of_the_FinFisher_suite"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Elements of the FinFisher suite</span> </div> </a> <ul id="toc-Elements_of_the_FinFisher_suite-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Method_of_infection" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Method_of_infection"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Method of infection</span> </div> </a> <ul id="toc-Method_of_infection-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Use_by_repressive_regimes" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Use_by_repressive_regimes"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Use by repressive regimes</span> </div> </a> <ul id="toc-Use_by_repressive_regimes-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Reporters_Without_Borders" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Reporters_Without_Borders"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Reporters Without Borders</span> </div> </a> <ul id="toc-Reporters_Without_Borders-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Firefox_masquerading" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Firefox_masquerading"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Firefox masquerading</span> </div> </a> <ul id="toc-Firefox_masquerading-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Detection" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Detection"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Detection</span> </div> </a> <ul id="toc-Detection-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">FinFisher</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 13 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-13" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">13 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/FinFisher" title="FinFisher – German" lang="de" hreflang="de" data-title="FinFisher" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/FinFisher" title="FinFisher – Spanish" lang="es" hreflang="es" data-title="FinFisher" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D9%81%DB%8C%D9%86%E2%80%8C%D9%81%DB%8C%D8%B4%D8%B1" title="فینفیشر – Persian" lang="fa" hreflang="fa" data-title="فینفیشر" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/FinFisher" title="FinFisher – French" lang="fr" hreflang="fr" data-title="FinFisher" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/FinFisher" title="FinFisher – Indonesian" lang="id" hreflang="id" data-title="FinFisher" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/FinFisher" title="FinFisher – Italian" lang="it" hreflang="it" data-title="FinFisher" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/FinFisher" title="FinFisher – Dutch" lang="nl" hreflang="nl" data-title="FinFisher" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-pnb mw-list-item"><a href="https://pnb.wikipedia.org/wiki/%D9%81%D9%86%E2%80%8C%D9%81%D8%B4%D8%B1" title="فنفشر – Western Punjabi" lang="pnb" hreflang="pnb" data-title="فنفشر" data-language-autonym="پنجابی" data-language-local-name="Western Punjabi" class="interlanguage-link-target"><span>پنجابی</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/FinFisher" title="FinFisher – Russian" lang="ru" hreflang="ru" data-title="FinFisher" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/FinFisher" title="FinFisher – Slovenian" lang="sl" hreflang="sl" data-title="FinFisher" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/FinFi%C5%A1er" title="FinFišer – Serbian" lang="sr" hreflang="sr" data-title="FinFišer" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/FinFisher" title="FinFisher – Turkish" lang="tr" hreflang="tr" data-title="FinFisher" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-ur mw-list-item"><a href="https://ur.wikipedia.org/wiki/%D9%81%D9%86%E2%80%8C%D9%81%D8%B4%D8%B1" title="فنفشر – Urdu" lang="ur" hreflang="ur" data-title="فنفشر" data-language-autonym="اردو" data-language-local-name="Urdu" class="interlanguage-link-target"><span>اردو</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q12432991#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/FinFisher" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:FinFisher" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/FinFisher"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=FinFisher&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=FinFisher&action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/FinFisher"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=FinFisher&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=FinFisher&action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/FinFisher" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/FinFisher" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=FinFisher&oldid=1256012567" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=FinFisher&action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&page=FinFisher&id=1256012567&wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FFinFisher"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FFinFisher"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&page=FinFisher&action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=FinFisher&printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:FinFisher" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q12432991" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Surveillance software</div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Finfisher_spyware.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Finfisher_spyware.jpg/220px-Finfisher_spyware.jpg" decoding="async" width="220" height="113" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Finfisher_spyware.jpg/330px-Finfisher_spyware.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Finfisher_spyware.jpg/440px-Finfisher_spyware.jpg 2x" data-file-width="1999" data-file-height="1026" /></a><figcaption>Suspected FinFisher government users that were active at some point in 2015.</figcaption></figure> <p><b>FinFisher</b>, also known as <b>FinSpy</b>,<sup id="cite_ref-NYT83012_1-0" class="reference"><a href="#cite_note-NYT83012-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> is <a href="/wiki/Surveillance" title="Surveillance">surveillance</a> software marketed by Lench IT Solutions plc, which markets the <a href="/wiki/Spyware" title="Spyware">spyware</a> through law enforcement channels.<sup id="cite_ref-NYT83012_1-1" class="reference"><a href="#cite_note-NYT83012-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> </p><p>FinFisher can be covertly installed on targets' computers by exploiting security lapses in the <a href="/wiki/Patch_(computing)" title="Patch (computing)">update</a> procedures of non-suspect software.<sup id="cite_ref-Wsj2011-11-21_2-0" class="reference"><a href="#cite_note-Wsj2011-11-21-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-TheTelegraph2011-11-28_3-0" class="reference"><a href="#cite_note-TheTelegraph2011-11-28-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-DerSpiegel2011-11-22_4-0" class="reference"><a href="#cite_note-DerSpiegel2011-11-22-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> The company has been criticized by human rights organizations for selling these capabilities to repressive or non-democratic states known for monitoring and imprisoning political dissidents.<sup id="cite_ref-Citizen03132013_5-0" class="reference"><a href="#cite_note-Citizen03132013-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Egypt" title="Egypt">Egyptian</a> dissidents who ransacked the offices of <a href="/wiki/State_Security_Investigations_Service" title="State Security Investigations Service">Egypt's secret police</a> following the overthrow of Egyptian President <a href="/wiki/Hosni_Mubarak" title="Hosni Mubarak">Hosni Mubarak</a> reported that they had discovered a contract with Gamma International for €287,000 for a license to run the FinFisher software.<sup id="cite_ref-TheRegister2011-09-21_6-0" class="reference"><a href="#cite_note-TheRegister2011-09-21-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> In 2014, an American citizen sued the Ethiopian government for surreptitiously installing FinSpy onto his computer in America and using it to wiretap his private Skype calls and monitor his entire family's every use of the computer for a period of months.<sup id="cite_ref-Kopstein_7-0" class="reference"><a href="#cite_note-Kopstein-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup> </p><p>Lench IT Solutions plc has a <a href="/wiki/United_Kingdom" title="United Kingdom">UK</a>-based branch, <a href="/wiki/Gamma_International" class="mw-redirect" title="Gamma International">Gamma International</a> Ltd in <a href="/wiki/Andover,_Hampshire" title="Andover, Hampshire">Andover</a>, England, and a Germany-based branch, Gamma International GmbH in <a href="/wiki/Munich" title="Munich">Munich</a>.<sup id="cite_ref-RSF-Corporate_Enemies_9-0" class="reference"><a href="#cite_note-RSF-Corporate_Enemies-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-B72512_10-0" class="reference"><a href="#cite_note-B72512-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> Gamma International is a subsidiary of the <a href="/wiki/Gamma_Group" title="Gamma Group">Gamma Group</a>, specializing in surveillance and monitoring, including equipment, software, and training services.<sup id="cite_ref-RSF-Corporate_Enemies_9-1" class="reference"><a href="#cite_note-RSF-Corporate_Enemies-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> It was reportedly owned by William Louthean Nelson through a <a href="/wiki/Shell_corporation" title="Shell corporation">shell corporation</a> in the <a href="/wiki/British_Virgin_Islands" title="British Virgin Islands">British Virgin Islands</a>.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup> The shell corporation was signed by a nominee director in order to withhold the identity of the ultimate beneficiary, which was Nelson, a common system for companies that are established offshore.<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup> </p><p>On August 6, 2014, FinFisher source code, pricing, support history, and other related data were retrieved from the Gamma International internal network and made available on the Internet.<sup id="cite_ref-breach_13-0" class="reference"><a href="#cite_note-breach-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> </p><p>The FinFisher GmbH opened insolvency proceedings at the Munich Local Court on 02.12.2021,<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> however this is only a restructuring and the company is to continue as Vilicius Holding GmbH.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Elements_of_the_FinFisher_suite">Elements of the FinFisher suite</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=FinFisher&action=edit&section=1" title="Edit section: Elements of the FinFisher suite"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In addition to <a href="/wiki/Spyware" title="Spyware">spyware</a>, the FinFisher suite offered by Gamma to the intelligence community includes monitoring of ongoing developments and updating of solutions and techniques which complement those developed by intelligence agencies.<sup id="cite_ref-FFPortfolioupdate_16-0" class="reference"><a href="#cite_note-FFPortfolioupdate-16"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> The software suite, which the company calls "Remote Monitoring and Deployment Solutions", has the ability to take control of target computers and to capture even encrypted data and communications. Using "enhanced remote deployment methods" it can install software on target computers.<sup id="cite_ref-FFPortfoliosoftware_17-0" class="reference"><a href="#cite_note-FFPortfoliosoftware-17"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup> An "IT Intrusion Training Program" is offered which includes training in methods and techniques and in the use of the company-supplied software.<sup id="cite_ref-FFPortfoliotraining_18-0" class="reference"><a href="#cite_note-FFPortfoliotraining-18"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> </p><p>The suite is marketed in Arabic, English, German, French, Portuguese, and Russian and offered worldwide at trade shows offering an intelligence support system, ISS, training, and products to law enforcement and intelligence agencies.<sup id="cite_ref-GGNews_19-0" class="reference"><a href="#cite_note-GGNews-19"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Method_of_infection">Method of infection</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=FinFisher&action=edit&section=2" title="Edit section: Method of infection"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>FinFisher malware is installed in various ways, including fake software updates, <a href="/wiki/Email" title="Email">emails</a> with fake <a href="/wiki/Email_attachment" title="Email attachment">attachments</a>, and security flaws in popular software. Sometimes the surveillance suite is installed after the target accepts installation of a fake update to commonly used software.<sup id="cite_ref-Wsj2011-11-21_2-1" class="reference"><a href="#cite_note-Wsj2011-11-21-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> Code which will install the <a href="/wiki/Malware" title="Malware">malware</a> has also been detected in emails.<sup id="cite_ref-NYT81312_20-0" class="reference"><a href="#cite_note-NYT81312-20"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup> The software, which is designed to evade detection by antivirus software, has versions which work on mobile phones of all major brands.<sup id="cite_ref-NYT83012_1-2" class="reference"><a href="#cite_note-NYT83012-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> </p><p>A security flaw in <a href="/wiki/Apple_Inc." title="Apple Inc.">Apple</a>'s <a href="/wiki/ITunes" title="ITunes">iTunes</a> allowed unauthorized third parties to use iTunes online update procedures to install unauthorized programs.<sup id="cite_ref-TheTelegraph2011-11-28_3-1" class="reference"><a href="#cite_note-TheTelegraph2011-11-28-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-DerSpiegel2011-11-22_4-1" class="reference"><a href="#cite_note-DerSpiegel2011-11-22-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> Gamma International offered presentations to government security officials at security software trade shows where they described how to covertly install the FinFisher spy software on suspects' computers using iTunes' update procedures. </p><p>The security flaw in iTunes that FinFisher is reported to have exploited was first described in 2008 by security software commentator <a href="/wiki/Brian_Krebs" title="Brian Krebs">Brian Krebs</a>.<sup id="cite_ref-TheTelegraph2011-11-28_3-2" class="reference"><a href="#cite_note-TheTelegraph2011-11-28-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-DerSpiegel2011-11-22_4-2" class="reference"><a href="#cite_note-DerSpiegel2011-11-22-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-Krebs_21-0" class="reference"><a href="#cite_note-Krebs-21"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> Apple did not patch the security flaw for more than three years, until November 2011. Apple officials have not offered an explanation as to why the flaw took so long to patch. Promotional videos used by the firm at trade shows which illustrate how to infect a computer with the surveillance suite were released by <a href="/wiki/WikiLeaks" title="WikiLeaks">WikiLeaks</a> in December 2011.<sup id="cite_ref-B72512_10-1" class="reference"><a href="#cite_note-B72512-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> </p><p>In 2014, the Ethiopian government was found to have installed FinSpy on the computer of an American citizen via a fake email attachment that appeared to be a <a href="/wiki/Doc_(computing)" title="Doc (computing)">Microsoft Word document</a>.<sup id="cite_ref-Kopstein_7-1" class="reference"><a href="#cite_note-Kopstein-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> </p><p>FinFisher has also been found to engage in politically motivated targeting. In Ethiopia, for instance, photos of a political opposition group are used to "bait" and infect users.<sup id="cite_ref-Citizen03132013_5-1" class="reference"><a href="#cite_note-Citizen03132013-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template"><span style="white-space: nowrap;">[<i><a href="/wiki/Wikipedia:Link_rot" title="Wikipedia:Link rot"><span title=" Dead link tagged April 2019">dead link</span></a></i><span style="visibility:hidden; color:transparent; padding-left:2px">‍</span>]</span></sup> </p><p>Technical analysis of the malware, methods of infection and its persistence techniques has been published in Code And Security blog in four parts.<sup id="cite_ref-CodeAndSec_22-0" class="reference"><a href="#cite_note-CodeAndSec-22"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Use_by_repressive_regimes">Use by repressive regimes</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=FinFisher&action=edit&section=3" title="Edit section: Use by repressive regimes"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>FinFisher's wide use by governments facing political resistance was reported in March 2011 after Egyptian protesters raided <a href="/wiki/State_Security_Investigations_Service" title="State Security Investigations Service">State Security Investigations Service</a> and found letters from Gamma International UK Ltd., confirming that SSI had been using a trial version for five months.<sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup></li> <li>A similar report in August 2012 concerned e-mails received by Bahraini activists and passed on (via a <a href="/wiki/Bloomberg_News" title="Bloomberg News">Bloomberg News</a> reporter) to University of Toronto computer researchers <a href="/wiki/Bill_Marczak" title="Bill Marczak">Bill Marczak</a> and <a href="/wiki/Morgan_Marquis-Boire" title="Morgan Marquis-Boire">Morgan Marquis-Boire</a> in May 2012. Analysis of the e-mails revealed code (FinSpy) designed to install spyware on the recipient's computer.<sup id="cite_ref-NYT83012_1-3" class="reference"><a href="#cite_note-NYT83012-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-NYT81312_20-1" class="reference"><a href="#cite_note-NYT81312-20"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup> A spokesman for Gamma claims no software was sold to Bahrain and that the software detected by the researchers was not a legitimate copy but perhaps a stolen, reverse-engineered or modified demonstration copy.<sup id="cite_ref-BN72712_24-0" class="reference"><a href="#cite_note-BN72712-24"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> In August 2014 <a href="/wiki/Bahrain_Watch" title="Bahrain Watch">Bahrain Watch</a> claimed that the leak of FinFisher data contained evidence suggesting that the Bahraini government was using the software to spy on opposition figures, highlighting communications between Gamma International support staff and a customer in Bahrain, and identifying a number of human rights lawyers, politicians, activists and journalists who had apparently been targeted.<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup></li> <li>According to a document dated 7 December 2012 from the Federal Ministry of the Interior to members of the Finance Committee of the German Parliament, the German "Bundesnachrichtendienst", the Federal Surveillance Agency, have licensed FinFisher/FinSpy, even though its legality in Germany is uncertain.<sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup></li> <li>In 2014, an America citizen sued the Ethiopian government for installing and using FinSpy to record a vast array of activities conducted by users of the machine, all whilst in America. Traces of the spyware inadvertently left on his computer show that information – including recordings of dozens of Skype phone calls – was surreptitiously sent to a secret control server located in Ethiopia and controlled by the Ethiopian government. FinSpy was downloaded on the plaintiff's computer when he opened an email with a Microsoft Word document attached. The attachment contained hidden malware that infected his computer.<sup id="cite_ref-Kopstein_7-2" class="reference"><a href="#cite_note-Kopstein-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> In March 2017, the <a href="/wiki/United_States_Court_of_Appeals_for_the_District_of_Columbia_Circuit" title="United States Court of Appeals for the District of Columbia Circuit">United States Court of Appeals for the District of Columbia Circuit</a> found that the Ethiopian government's conduct was protected from liability by the <a href="/wiki/Foreign_Sovereign_Immunities_Act" title="Foreign Sovereign Immunities Act">Foreign Sovereign Immunities Act</a>.<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup></li> <li>In 2015, FinFisher was reported to have been in use since 2012 for the 'Fungua Macho' surveillance programme of <a href="/wiki/Uganda" title="Uganda">Uganda</a>'s <a href="/wiki/President_Museveni" class="mw-redirect" title="President Museveni">President Museveni</a>, spying upon the Ugandan opposition party, the <a href="/wiki/Forum_for_Democratic_Change" title="Forum for Democratic Change">Forum for Democratic Change</a>.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup></li></ul> <ul><li>In 2015 it is reported that FinFisher executives sold, illegally, the system to Turkey to enable their security services to spy on government opposition parties. Four former executives were charged in 2023 in <a href="/wiki/Munich" title="Munich">Munich</a> with failure to apply for an export licence for the $5.4 million contract.<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="Reporters_Without_Borders">Reporters Without Borders</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=FinFisher&action=edit&section=4" title="Edit section: Reporters Without Borders"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>On 12 March 2013 <a href="/wiki/Reporters_Without_Borders" title="Reporters Without Borders">Reporters Without Borders</a> named Gamma International as one of five "Corporate Enemies of the Internet" and “digital era mercenaries” for selling products that have been or are being used by governments to violate human rights and freedom of information. FinFisher technology was used in <a href="/wiki/Bahrain" title="Bahrain">Bahrain</a> and Reporters Without Borders, together with <a href="/wiki/Privacy_International" title="Privacy International">Privacy International</a>, the <a href="/wiki/European_Center_for_Constitutional_and_Human_Rights" title="European Center for Constitutional and Human Rights">European Center for Constitutional and Human Rights</a> (ECCHR), the <a href="/wiki/Bahrain_Centre_for_Human_Rights" title="Bahrain Centre for Human Rights">Bahrain Centre for Human Rights</a>, and Bahrain Watch filed an <a href="/wiki/Organisation_for_Economic_Co-operation_and_Development" class="mw-redirect" title="Organisation for Economic Co-operation and Development">Organisation for Economic Co-operation and Development</a> (OECD) complaint, asking the National Contact Point in the United Kingdom to further investigate Gamma's possible involvement in Bahrain. Since then research has shown that FinFisher technology was used in Australia, Austria, Bahrain, Bangladesh, Britain, Brunei, Bulgaria, Canada, the Czech Republic, Estonia, Ethiopia, Germany, Hungary, India, Indonesia, Japan, Latvia, Lithuania, North Macedonia, Malaysia, Mexico, Mongolia, Netherlands, Nigeria, Pakistan, Panama, Qatar, Romania, Serbia, Singapore, South Africa, Turkey, Turkmenistan, the United Arab Emirates, the United States, Venezuela and Vietnam.<sup id="cite_ref-RSF-Corporate_Enemies_9-2" class="reference"><a href="#cite_note-RSF-Corporate_Enemies-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-B72512_10-2" class="reference"><a href="#cite_note-B72512-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Firefox_masquerading">Firefox masquerading</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=FinFisher&action=edit&section=5" title="Edit section: Firefox masquerading"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>FinFisher is capable of masquerading as other more legitimate programs, such as <a href="/wiki/Firefox" title="Firefox">Mozilla Firefox</a>. On April 30, 2013, <a href="/wiki/Mozilla" title="Mozilla">Mozilla</a> announced that they had sent Gamma a cease-and-desist letter for trademark infringement.<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup> Gamma had created an espionage program that was entitled firefox.exe and even provided a version number and trademark to appear to be legitimate Firefox software.<sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Detection">Detection</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=FinFisher&action=edit&section=6" title="Edit section: Detection"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In an article of <i><a href="/wiki/PC_Magazine" class="mw-redirect" title="PC Magazine">PC Magazine</a></i>, Bill Marczak (member of Bahrain Watch and computer science PhD student at <a href="/wiki/University_of_California,_Berkeley" title="University of California, Berkeley">University of California, Berkeley</a> doing research into FinFisher) said of FinSpy Mobile (Gamma's mobile spyware): "As we saw with respect to the desktop version of FinFisher, antivirus alone isn't enough, as it bypassed antivirus scans".<sup id="cite_ref-pcmag_36-0" class="reference"><a href="#cite_note-pcmag-36"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> The article's author Sara Yin, an analyst at <i>PC Magazine</i>, predicted that antivirus providers are likely to have updated their signatures to detect FinSpy Mobile.<sup id="cite_ref-pcmag_36-1" class="reference"><a href="#cite_note-pcmag-36"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> </p><p>According to announcements from <a href="/wiki/ESET" title="ESET">ESET</a>, FinFisher and FinSpy are detected by ESET antivirus software as "Win32/Belesak.D" <a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">trojan</a>.<sup id="cite_ref-ESET1_37-0" class="reference"><a href="#cite_note-ESET1-37"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-ESET2_38-0" class="reference"><a href="#cite_note-ESET2-38"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup> </p><p>Other security vendors claim that their products will block any spyware they know about and can detect (regardless of who may have launched it), and <a href="/wiki/Eugene_Kaspersky" title="Eugene Kaspersky">Eugene Kaspersky</a>, head of IT security company <a href="/wiki/Kaspersky_Lab" title="Kaspersky Lab">Kaspersky Lab</a>, stated, "We detect all malware regardless its purpose and origin".<sup id="cite_ref-IW_39-0" class="reference"><a href="#cite_note-IW-39"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup> Two years after that statement by Eugene Kaspersky in 2012 a description of the technique used by FinFisher to evade Kaspersky protection was published in Part 2 of the relevant blog at Code And Security. </p><p>FinFisher has also made headlines in the past because its products were found to be used by authoritarian regimes against opponents in several Middle Eastern countries.<sup id="cite_ref-Dawn_40-0" class="reference"><a href="#cite_note-Dawn-40"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=FinFisher&action=edit&section=7" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1184024115">.mw-parser-output .div-col{margin-top:0.3em;column-width:30em}.mw-parser-output .div-col-small{font-size:90%}.mw-parser-output .div-col-rules{column-rule:1px solid #aaa}.mw-parser-output .div-col dl,.mw-parser-output .div-col ol,.mw-parser-output .div-col ul{margin-top:0}.mw-parser-output .div-col li,.mw-parser-output .div-col dd{page-break-inside:avoid;break-inside:avoid-column}</style><div class="div-col" style="column-width: 30em;"> <ul><li><a href="/wiki/Computer_and_Internet_Protocol_Address_Verifier" title="Computer and Internet Protocol Address Verifier">Computer and Internet Protocol Address Verifier</a> (CIPAV)</li> <li><a href="/wiki/Duqu" title="Duqu">Duqu</a></li> <li><a href="/wiki/Flame_(malware)" title="Flame (malware)">Flame (malware)</a></li> <li><a href="/wiki/Hacking_Team" class="mw-redirect" title="Hacking Team">Hacking Team</a></li> <li><a href="/wiki/Mahdi_(malware)" title="Mahdi (malware)">Mahdi (malware)</a></li> <li><a href="/wiki/MiniPanzer_and_MegaPanzer" title="MiniPanzer and MegaPanzer">MiniPanzer and MegaPanzer</a></li> <li><a href="/wiki/NSA_ANT_catalog" class="mw-redirect" title="NSA ANT catalog">NSA ANT catalog</a></li> <li><a href="/wiki/R2D2_(trojan)" class="mw-redirect" title="R2D2 (trojan)">R2D2 (trojan)</a></li> <li><a href="/wiki/Stuxnet" title="Stuxnet">Stuxnet</a></li> <li><a href="/wiki/Tailored_Access_Operations" title="Tailored Access Operations">Tailored Access Operations</a></li></ul></div> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=FinFisher&action=edit&section=8" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-NYT83012-1"><span class="mw-cite-backlink">^ <a href="#cite_ref-NYT83012_1-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-NYT83012_1-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-NYT83012_1-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-NYT83012_1-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFNicole_Perlroth2012" class="citation news cs1">Nicole Perlroth (August 30, 2012). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html">"Software Meant to Fight Crime Is Used to Spy on Dissidents"</a>. <i>The New York Times</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120831143316/http://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html">Archived</a> from the original on August 31, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=Software+Meant+to+Fight+Crime+Is+Used+to+Spy+on+Dissidents&rft.date=2012-08-30&rft.au=Nicole+Perlroth&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2012%2F08%2F31%2Ftechnology%2Ffinspy-software-is-tracking-political-dissidents.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-Wsj2011-11-21-2"><span class="mw-cite-backlink">^ <a href="#cite_ref-Wsj2011-11-21_2-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Wsj2011-11-21_2-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJennifer_Valentino-Devries2011" class="citation news cs1">Jennifer Valentino-Devries (2011-11-21). <a rel="nofollow" class="external text" href="https://blogs.wsj.com/digits/2011/11/21/surveillance-company-says-it-sent-fake-itunes-flash-updates-documents-show/">"Surveillance Company Says It Sent Fake iTunes, Flash Updates"</a>. <a href="/wiki/The_Wall_Street_Journal" title="The Wall Street Journal">The Wall Street Journal</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20111130142411/http://blogs.wsj.com/digits/2011/11/21/surveillance-company-says-it-sent-fake-itunes-flash-updates-documents-show/">Archived</a> from the original on 2011-11-30<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-11-28</span></span>. <q>Perhaps the most extensive marketing materials came from Gamma's FinFisher brand, which says it works by "sending fake software updates for popular software," from Apple, Adobe and others. The FinFisher documentation included brochures in several languages, as well as videos touting the tools.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Surveillance+Company+Says+It+Sent+Fake+iTunes%2C+Flash+Updates&rft.date=2011-11-21&rft.au=Jennifer+Valentino-Devries&rft_id=https%3A%2F%2Fblogs.wsj.com%2Fdigits%2F2011%2F11%2F21%2Fsurveillance-company-says-it-sent-fake-itunes-flash-updates-documents-show%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-TheTelegraph2011-11-28-3"><span class="mw-cite-backlink">^ <a href="#cite_ref-TheTelegraph2011-11-28_3-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-TheTelegraph2011-11-28_3-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-TheTelegraph2011-11-28_3-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChristopher_Williams2011" class="citation news cs1">Christopher Williams (2011-11-24). <a rel="nofollow" class="external text" href="https://www.telegraph.co.uk/technology/apple/8912714/Apple-iTunes-flaw-allowed-government-spying-for-3-years.html">"Apple iTunes flaw 'allowed government spying for 3 years'<span class="cs1-kern-right"></span>"</a>. <a href="/wiki/The_Daily_Telegraph" title="The Daily Telegraph">The Daily Telegraph</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20111127212359/http://www.telegraph.co.uk/technology/apple/8912714/Apple-iTunes-flaw-allowed-government-spying-for-3-years.html">Archived</a> from the original on 2011-11-27<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-11-28</span></span>. <q>A British company called Gamma International marketed hacking software to governments that exploited the vulnerability via a bogus update to iTunes, Apple's media player, which is installed on more than 250 million machines worldwide.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Apple+iTunes+flaw+%27allowed+government+spying+for+3+years%27&rft.date=2011-11-24&rft.au=Christopher+Williams&rft_id=https%3A%2F%2Fwww.telegraph.co.uk%2Ftechnology%2Fapple%2F8912714%2FApple-iTunes-flaw-allowed-government-spying-for-3-years.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-DerSpiegel2011-11-22-4"><span class="mw-cite-backlink">^ <a href="#cite_ref-DerSpiegel2011-11-22_4-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-DerSpiegel2011-11-22_4-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-DerSpiegel2011-11-22_4-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMarcel_Rosenbach2011" class="citation news cs1">Marcel Rosenbach (2011-11-22). <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/germany/0,1518,799259,00.html">"Firm Sought to Install Spyware Via Faked iTunes Updates"</a>. <a href="/wiki/Der_Spiegel" title="Der Spiegel">Der Spiegel</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20111127095028/http://www.spiegel.de/international/germany/0,1518,799259,00.html">Archived</a> from the original on 2011-11-27<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-11-28</span></span>. <q>Apparently, at least according to a video promoting FinFisher, the software uses Apple's popular iTunes in order to load snooping software onto the computers of the intended suspects.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Firm+Sought+to+Install+Spyware+Via+Faked+iTunes+Updates&rft.date=2011-11-22&rft.au=Marcel+Rosenbach&rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fgermany%2F0%2C1518%2C799259%2C00.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-Citizen03132013-5"><span class="mw-cite-backlink">^ <a href="#cite_ref-Citizen03132013_5-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Citizen03132013_5-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMarquis-Boire2013" class="citation news cs1">Marquis-Boire, Morgan (13 March 2013). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140809015927/https://citizenlab.org/2013/03/you-only-click-twice-finfishers-global-proliferation-2/">"You Only Click Twice: FinFisher's Global Proliferation"</a>. University of Toronto <a href="/wiki/Citizen_Lab" title="Citizen Lab">Citizen Lab</a>. Archived from <a rel="nofollow" class="external text" href="https://citizenlab.org/2013/03/you-only-click-twice-finfishers-global-proliferation-2/">the original</a> on 9 August 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">3 August</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=You+Only+Click+Twice%3A+FinFisher%27s+Global+Proliferation&rft.date=2013-03-13&rft.aulast=Marquis-Boire&rft.aufirst=Morgan&rft_id=https%3A%2F%2Fcitizenlab.org%2F2013%2F03%2Fyou-only-click-twice-finfishers-global-proliferation-2%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-TheRegister2011-09-21-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-TheRegister2011-09-21_6-0">^</a></b></span> <span class="reference-text"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohn_Leyden2011" class="citation news cs1">John Leyden (2011-09-21). <a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2011/09/21/egypt_cyber_spy_controversy/">"UK firm denies supplying spyware to Mubarak's secret police: RATs nest found in Egyptian spook HQ"</a>. <a href="/wiki/The_Register" title="The Register">The Register</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20111127015539/http://www.theregister.co.uk/2011/09/21/egypt_cyber_spy_controversy/">Archived</a> from the original on 2011-11-27<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-11-28</span></span>. <q>Documents uncovered when the country's security service headquarters were ransacked during the Arab Spring uprising suggest that Egypt had purchased a package called FinFisher to spy on dissidents.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=UK+firm+denies+supplying+spyware+to+Mubarak%27s+secret+police%3A+RATs+nest+found+in+Egyptian+spook+HQ&rft.date=2011-09-21&rft.au=John+Leyden&rft_id=https%3A%2F%2Fwww.theregister.co.uk%2F2011%2F09%2F21%2Fegypt_cyber_spy_controversy%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-Kopstein-7"><span class="mw-cite-backlink">^ <a href="#cite_ref-Kopstein_7-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Kopstein_7-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Kopstein_7-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKopfstein2014" class="citation news cs1">Kopfstein, Janus (March 10, 2014). <a rel="nofollow" class="external text" href="http://www.newyorker.com/tech/elements/hackers-without-borders">"Hackers Without Borders"</a>. <i>The Washington Post</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140826115336/http://www.newyorker.com/tech/elements/hackers-without-borders">Archived</a> from the original on August 26, 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">August 24,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Washington+Post&rft.atitle=Hackers+Without+Borders&rft.date=2014-03-10&rft.aulast=Kopfstein&rft.aufirst=Janus&rft_id=http%3A%2F%2Fwww.newyorker.com%2Ftech%2Felements%2Fhackers-without-borders&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.eff.org/press/releases/american-sues-ethiopian-government-spyware-infection">"American Sues Ethiopian Government for Spyware Infection"</a>. <i>Electronic Frontier Foundation</i>. February 18, 2014. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20141003161907/https://www.eff.org/press/releases/american-sues-ethiopian-government-spyware-infection">Archived</a> from the original on 2014-10-03<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-08-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Electronic+Frontier+Foundation&rft.atitle=American+Sues+Ethiopian+Government+for+Spyware+Infection&rft.date=2014-02-18&rft_id=https%3A%2F%2Fwww.eff.org%2Fpress%2Freleases%2Famerican-sues-ethiopian-government-spyware-infection&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-RSF-Corporate_Enemies-9"><span class="mw-cite-backlink">^ <a href="#cite_ref-RSF-Corporate_Enemies_9-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-RSF-Corporate_Enemies_9-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-RSF-Corporate_Enemies_9-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://surveillance.rsf.org/en/gamma-international/">"Corporate Enemies: Gamma International"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130316130016/http://surveillance.rsf.org/en/gamma-international/">Archived</a> 2013-03-16 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, <i>The Enemies of the Internet, Special Edition: Surveillance</i>, Reporters Without Borders, 12 March 2013.</span> </li> <li id="cite_note-B72512-10"><span class="mw-cite-backlink">^ <a href="#cite_ref-B72512_10-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-B72512_10-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-B72512_10-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVernon_Silver2012" class="citation news cs1">Vernon Silver (July 25, 2012). <a rel="nofollow" class="external text" href="https://www.bloomberg.com/news/2012-07-25/cyber-attacks-on-activists-traced-to-finfisher-spyware-of-gamma.html">"Cyber Attacks on Activists Traced to FinFisher Spyware of Gamma"</a>. <i>Bloomberg</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120810210127/http://www.bloomberg.com/news/2012-07-25/cyber-attacks-on-activists-traced-to-finfisher-spyware-of-gamma.html">Archived</a> from the original on August 10, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Bloomberg&rft.atitle=Cyber+Attacks+on+Activists+Traced+to+FinFisher+Spyware+of+Gamma&rft.date=2012-07-25&rft.au=Vernon+Silver&rft_id=https%3A%2F%2Fwww.bloomberg.com%2Fnews%2F2012-07-25%2Fcyber-attacks-on-activists-traced-to-finfisher-spyware-of-gamma.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.theguardian.com/uk/2012/nov/28/offshore-company-directors-military-intelligence">"Offshore company directors' links to military and intelligence revealed"</a>. <i>the Guardian</i>. 2012-11-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2022-03-28</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=the+Guardian&rft.atitle=Offshore+company+directors%27+links+to+military+and+intelligence+revealed&rft.date=2012-11-28&rft_id=http%3A%2F%2Fwww.theguardian.com%2Fuk%2F2012%2Fnov%2F28%2Foffshore-company-directors-military-intelligence&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://wikileaksdecrypted.com/the-2014-finfisher-leaks-were-a-precursor-to-both-vault-7-and-panama-papers-finfishervault7-wikileaks/">"The 2014 FinFisher Leaks were a precursor to both Vault 7 and Panama Papers"</a>. <i>wikileaksdecrypted.com</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170328020459/http://wikileaksdecrypted.com/the-2014-finfisher-leaks-were-a-precursor-to-both-vault-7-and-panama-papers-finfishervault7-wikileaks/">Archived</a> from the original on 2017-03-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2017-03-27</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=wikileaksdecrypted.com&rft.atitle=The+2014+FinFisher+Leaks+were+a+precursor+to+both+Vault+7+and+Panama+Papers&rft_id=http%3A%2F%2Fwikileaksdecrypted.com%2Fthe-2014-finfisher-leaks-were-a-precursor-to-both-vault-7-and-panama-papers-finfishervault7-wikileaks%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-breach-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-breach_13-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAndre_Meister2014" class="citation news cs1">Andre Meister (August 6, 2014). <a rel="nofollow" class="external text" href="https://netzpolitik.org/2014/gamma-finfisher-hacked-40-gb-of-internal-documents-and-source-code-of-government-malware-published/">"Gamma FinFisher hacked: 40 GB of internal documents and source code of government malware published"</a>. Netzpolitik.org. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140806172324/https://netzpolitik.org/2014/gamma-finfisher-hacked-40-gb-of-internal-documents-and-source-code-of-government-malware-published/">Archived</a> from the original on August 6, 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">August 6,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Gamma+FinFisher+hacked%3A+40+GB+of+internal+documents+and+source+code+of+government+malware+published&rft.date=2014-08-06&rft.au=Andre+Meister&rft_id=https%3A%2F%2Fnetzpolitik.org%2F2014%2Fgamma-finfisher-hacked-40-gb-of-internal-documents-and-source-code-of-government-malware-published%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20211210094128/https://www.unternehmensregister.de/ureg/result.html;jsessionid=D95A6C4A9848ED0BBC67C32D319CC527.web01-1?submitaction=showDocument&id=29317072">"Unternehmensregister"</a>. <i>www.unternehmensregister.de</i>. Archived from <a rel="nofollow" class="external text" href="https://www.unternehmensregister.de/ureg/result.html;jsessionid=D95A6C4A9848ED0BBC67C32D319CC527.web01-1?submitaction=showDocument&id=29317072">the original</a> on 2021-12-10<span class="reference-accessdate">. Retrieved <span class="nowrap">2021-12-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.unternehmensregister.de&rft.atitle=Unternehmensregister&rft_id=https%3A%2F%2Fwww.unternehmensregister.de%2Fureg%2Fresult.html%3Bjsessionid%3DD95A6C4A9848ED0BBC67C32D319CC527.web01-1%3Fsubmitaction%3DshowDocument%26id%3D29317072&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20211210094128/https://www.unternehmensregister.de/ureg/result.html;jsessionid=D95A6C4A9848ED0BBC67C32D319CC527.web01-1?submitaction=showDocument&id=29317072">"Unternehmensregister"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.unternehmensregister.de/ureg/result.html;jsessionid=D95A6C4A9848ED0BBC67C32D319CC527.web01-1?submitaction=showDocument&id=29317072">the original</a> on 2021-12-10<span class="reference-accessdate">. Retrieved <span class="nowrap">2021-12-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Unternehmensregister&rft_id=https%3A%2F%2Fwww.unternehmensregister.de%2Fureg%2Fresult.html%3Bjsessionid%3DD95A6C4A9848ED0BBC67C32D319CC527.web01-1%3Fsubmitaction%3DshowDocument%26id%3D29317072&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="https://www.heise.de/news/Spyware-Finfisher-nach-Namenswechsel-bei-neuer-Holding-Vilicius-6292281.html">"Spyware Finfisher nach Namenswechsel bei neuer Holding Vilicius"</a>. <i>heise online</i> (in German). 10 December 2021. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20211211001241/https://www.heise.de/news/Spyware-Finfisher-nach-Namenswechsel-bei-neuer-Holding-Vilicius-6292281.html">Archived</a> from the original on 2021-12-11<span class="reference-accessdate">. Retrieved <span class="nowrap">2021-12-11</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=heise+online&rft.atitle=Spyware+Finfisher+nach+Namenswechsel+bei+neuer+Holding+Vilicius&rft.date=2021-12-10&rft_id=https%3A%2F%2Fwww.heise.de%2Fnews%2FSpyware-Finfisher-nach-Namenswechsel-bei-neuer-Holding-Vilicius-6292281.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-FFPortfolioupdate-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-FFPortfolioupdate_16-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120508132835/http://www.finfisher.com/FinFisher/en/portfolio.php">"Portfolio"</a>. <i>FinFisher IT Intrusion</i>. Gamma Group. Archived from <a rel="nofollow" class="external text" href="http://www.finfisher.com/FinFisher/en/portfolio.php">the original</a> on May 8, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2012</span>. <q>Gamma addresses ongoing developments in the IT Intrusion field with solutions to enhance the capabilities of our clients. Easy to use high-end solutions and techniques complement the intelligence community's knowhow enabling it to address relevant Intrusion challenges on a tactical level.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=FinFisher+IT+Intrusion&rft.atitle=Portfolio&rft_id=http%3A%2F%2Fwww.finfisher.com%2FFinFisher%2Fen%2Fportfolio.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120508132835/http://www.finfisher.com/FinFisher/en/portfolio.php">"FinFisher IT Intrusion :: Portfolio"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.finfisher.com/FinFisher/en/portfolio.php">the original</a> on May 8, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=FinFisher+IT+Intrusion+%3A%3A+Portfolio&rft_id=http%3A%2F%2Fwww.finfisher.com%2FFinFisher%2Fen%2Fportfolio.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-FFPortfoliosoftware-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-FFPortfoliosoftware_17-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120508132835/http://www.finfisher.com/FinFisher/en/portfolio.php">"Portfolio"</a>. <i>FinFisher IT Intrusion</i>. Gamma Group. Archived from <a rel="nofollow" class="external text" href="http://www.finfisher.com/FinFisher/en/portfolio.php">the original</a> on May 8, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2012</span>. <q>The Remote Monitoring and Deployment Solutions are used to access target Systems to give full access to stored information with the ability to take control of target systems' functions to the point of capturing encrypted data and communications. When used in combination with enhanced remote deployment methods, the Government Agencies will have the capability to remotely deploy software on target systems.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=FinFisher+IT+Intrusion&rft.atitle=Portfolio&rft_id=http%3A%2F%2Fwww.finfisher.com%2FFinFisher%2Fen%2Fportfolio.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120508132835/http://www.finfisher.com/FinFisher/en/portfolio.php">"FinFisher IT Intrusion :: Portfolio"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.finfisher.com/FinFisher/en/portfolio.php">the original</a> on May 8, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=FinFisher+IT+Intrusion+%3A%3A+Portfolio&rft_id=http%3A%2F%2Fwww.finfisher.com%2FFinFisher%2Fen%2Fportfolio.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-FFPortfoliotraining-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-FFPortfoliotraining_18-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120508132835/http://www.finfisher.com/FinFisher/en/portfolio.php">"Portfolio"</a>. <i>FinFisher IT Intrusion</i>. Gamma Group. Archived from <a rel="nofollow" class="external text" href="http://www.finfisher.com/FinFisher/en/portfolio.php">the original</a> on May 8, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2012</span>. <q>The IT Intrusion Training Program includes courses on both, products supplied as well as practical IT Intrusion methods and techniques. This program transfers years of knowledge and experience to endusers, thus maximizing their capabilities in this field.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=FinFisher+IT+Intrusion&rft.atitle=Portfolio&rft_id=http%3A%2F%2Fwww.finfisher.com%2FFinFisher%2Fen%2Fportfolio.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120508132835/http://www.finfisher.com/FinFisher/en/portfolio.php">"FinFisher IT Intrusion :: Portfolio"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.finfisher.com/FinFisher/en/portfolio.php">the original</a> on May 8, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=FinFisher+IT+Intrusion+%3A%3A+Portfolio&rft_id=http%3A%2F%2Fwww.finfisher.com%2FFinFisher%2Fen%2Fportfolio.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-GGNews-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-GGNews_19-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20121004185659/http://www.finfisher.com/FinFisher/en/news.php">"News"</a>. Gamma Group. Archived from <a rel="nofollow" class="external text" href="http://www.finfisher.com/FinFisher/en/news.php">the original</a> on October 4, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=News&rft.pub=Gamma+Group&rft_id=http%3A%2F%2Fwww.finfisher.com%2FFinFisher%2Fen%2Fnews.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20121004185659/http://www.finfisher.com/FinFisher/en/news.php">"FinFisher IT Intrusion :: News"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.finfisher.com/FinFisher/en/news.php">the original</a> on October 4, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=FinFisher+IT+Intrusion+%3A%3A+News&rft_id=http%3A%2F%2Fwww.finfisher.com%2FFinFisher%2Fen%2Fnews.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-NYT81312-20"><span class="mw-cite-backlink">^ <a href="#cite_ref-NYT81312_20-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-NYT81312_20-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNicole_Perlroth2012" class="citation news cs1">Nicole Perlroth (August 13, 2012). <a rel="nofollow" class="external text" href="http://bits.blogs.nytimes.com/2012/08/13/elusive-finspy-spyware-pops-up-in-10-countries/">"Elusive FinSpy Spyware Pops Up in 10 Countries"</a> <span class="cs1-format">(blog by reporter)</span>. <i>The New York Times</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120818120432/http://bits.blogs.nytimes.com/2012/08/13/elusive-finspy-spyware-pops-up-in-10-countries/">Archived</a> from the original on August 18, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=Elusive+FinSpy+Spyware+Pops+Up+in+10+Countries&rft.date=2012-08-13&rft.au=Nicole+Perlroth&rft_id=http%3A%2F%2Fbits.blogs.nytimes.com%2F2012%2F08%2F13%2Felusive-finspy-spyware-pops-up-in-10-countries%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-Krebs-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-Krebs_21-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBrian_Krebs2011" class="citation news cs1"><a href="/wiki/Brian_Krebs" title="Brian Krebs">Brian Krebs</a> (2011-11-23). <a rel="nofollow" class="external text" href="http://krebsonsecurity.com/2011/11/apple-took-3-years-to-fix-finfisher-trojan-hole/">"Apple Took 3+ Years to Fix FinFisher Trojan Hole"</a>. <a href="/wiki/Krebs_on_Security" class="mw-redirect" title="Krebs on Security">Krebs on Security</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20111126213050/http://krebsonsecurity.com/2011/11/apple-took-3-years-to-fix-finfisher-trojan-hole/">Archived</a> from the original on 2011-11-26<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-11-28</span></span>. <q>I first wrote about this vulnerability for The Washington Post in July 2008, after interviewing Argentinian security researcher Francisco Amato about "Evilgrade," a devious new penetration testing tool he had developed.</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Apple+Took+3%2B+Years+to+Fix+FinFisher+Trojan+Hole&rft.date=2011-11-23&rft.au=Brian+Krebs&rft_id=http%3A%2F%2Fkrebsonsecurity.com%2F2011%2F11%2Fapple-took-3-years-to-fix-finfisher-trojan-hole%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-CodeAndSec-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-CodeAndSec_22-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCoding_and_Security2014" class="citation news cs1"><a href="/w/index.php?title=Coding_and_Security&action=edit&redlink=1" class="new" title="Coding and Security (page does not exist)">Coding and Security</a> (2014-09-19). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160306060327/https://www.codeandsec.com/FinFisher-Malware-Analysis-Part-1">"FinFisher Malware Analysis and Technical Write-up"</a>. <a href="/w/index.php?title=Coding_and_Security&action=edit&redlink=1" class="new" title="Coding and Security (page does not exist)">Coding and Security</a>. Archived from <a rel="nofollow" class="external text" href="https://www.codeandsec.com/FinFisher-Malware-Analysis-Part-1">the original</a> on 2016-03-06<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-09-19</span></span>. <q>Detailed analysis of all components of FinFisher malware</q></cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=FinFisher+Malware+Analysis+and+Technical+Write-up&rft.date=2014-09-19&rft.au=Coding+and+Security&rft_id=https%3A%2F%2Fwww.codeandsec.com%2FFinFisher-Malware-Analysis-Part-1&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1 cs1-prop-foreign-lang-source"><a rel="nofollow" class="external text" href="http://www.shorouknews.com/columns/view.aspx?cdate=23102012&id=c5b92fd7-d56e-484c-865b-f7856fde2a48">"Restrictions on freedom of communication"</a>. <i>shorouknews.com</i> (in Arabic). Sunrise Gateway. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140325070436/http://www.shorouknews.com/columns/view.aspx?cdate=23102012&id=c5b92fd7-d56e-484c-865b-f7856fde2a48">Archived</a> from the original on 25 March 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">25 March</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=shorouknews.com&rft.atitle=Restrictions+on+freedom+of+communication&rft_id=http%3A%2F%2Fwww.shorouknews.com%2Fcolumns%2Fview.aspx%3Fcdate%3D23102012%26id%3Dc5b92fd7-d56e-484c-865b-f7856fde2a48&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-BN72712-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-BN72712_24-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVernon_Silver2012" class="citation news cs1">Vernon Silver (July 27, 2012). <a rel="nofollow" class="external text" href="https://www.bloomberg.com/news/2012-07-27/gamma-says-no-spyware-sold-to-bahrain-may-be-stolen-copy.html">"Gamma Says No Spyware Sold to Bahrain; May Be Stolen Copy"</a>. <i>Bloomberg News</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120731005707/http://www.bloomberg.com/news/2012-07-27/gamma-says-no-spyware-sold-to-bahrain-may-be-stolen-copy.html">Archived</a> from the original on July 31, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Bloomberg+News&rft.atitle=Gamma+Says+No+Spyware+Sold+to+Bahrain%3B+May+Be+Stolen+Copy&rft.date=2012-07-27&rft.au=Vernon+Silver&rft_id=https%3A%2F%2Fwww.bloomberg.com%2Fnews%2F2012-07-27%2Fgamma-says-no-spyware-sold-to-bahrain-may-be-stolen-copy.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDesmukh2014" class="citation web cs1">Desmukh, Fahad (7 August 2014). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140815233325/https://bahrainwatch.org/blog/2014/08/07/uk-spyware-used-to-hack-bahrain-lawyers-activists/">"Bahrain Government Hacked Lawyers and Activists with UK Spyware"</a>. <i><a href="/wiki/Bahrain_Watch" title="Bahrain Watch">Bahrain Watch</a></i>. Archived from <a rel="nofollow" class="external text" href="https://bahrainwatch.org/blog/2014/08/07/uk-spyware-used-to-hack-bahrain-lawyers-activists/">the original</a> on 15 August 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">22 August</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Bahrain+Watch&rft.atitle=Bahrain+Government+Hacked+Lawyers+and+Activists+with+UK+Spyware&rft.date=2014-08-07&rft.aulast=Desmukh&rft.aufirst=Fahad&rft_id=https%3A%2F%2Fbahrainwatch.org%2Fblog%2F2014%2F08%2F07%2Fuk-spyware-used-to-hack-bahrain-lawyers-activists%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAndre_Meister2013" class="citation news cs1">Andre Meister (16 January 2013). <a rel="nofollow" class="external text" href="https://netzpolitik.org/2013/secret-government-document-reveals-german-federal-police-plans-to-use-gamma-finfisher-spyware/">"Secret Government Document Reveals: German Federal Police Plans To Use Gamma FinFisher Spyware"</a>. Netzpolitik.org. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130728142906/https://netzpolitik.org/2013/secret-government-document-reveals-german-federal-police-plans-to-use-gamma-finfisher-spyware/">Archived</a> from the original on 28 July 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">19 July</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secret+Government+Document+Reveals%3A+German+Federal+Police+Plans+To+Use+Gamma+FinFisher+Spyware&rft.date=2013-01-16&rft.au=Andre+Meister&rft_id=https%3A%2F%2Fnetzpolitik.org%2F2013%2Fsecret-government-document-reveals-german-federal-police-plans-to-use-gamma-finfisher-spyware%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1176897979">.mw-parser-output .bluebook-title{font-style:italic}.mw-parser-output .bluebook-title i{font-style:normal}.mw-parser-output .bluebook-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .bluebook-lock-limited a,.mw-parser-output .bluebook-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .bluebook-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-hidden-error{display:none;color:#d33}.mw-parser-output .cs1-visible-error{color:#d33}.mw-parser-output .cs1-maint{display:none;color:#3a3;margin-left:0.3em}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}</style><cite id="CITEREFNote2018">Note, <span class="bluebook-title bluebook-lock-none" title=""><a rel="nofollow" class="external text" href="https://harvardlawreview.org/wp-content/uploads/2018/02/1179-1186_Online.pdf">Recent Case: D.C. Circuit Finds Ethiopia Immune in Hacking Suit</a></span>, 131 <a href="/wiki/Harvard_Law_Review" title="Harvard Law Review">Harv. L. Rev.</a> 1179 (2018).</cite></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><cite><i>Doe v. Federal Democratic Republic of Ethiopia</i></cite>, <a rel="nofollow" class="external text" href="https://scholar.google.com/scholar_case?case=12016984034191000630">851 F.3d 7</a> (D.C. Cir. 2017), <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210910203629/https://scholar.google.com/scholar_case?case=12016984034191000630">archived</a> from the original.</span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNick_HopkinsJake_Morris2015" class="citation news cs1">Nick Hopkins; Jake Morris (15 October 2015). <a rel="nofollow" class="external text" href="https://www.bbc.co.uk/news/uk-34529237">"UK firm's surveillance kit 'used to crush Uganda opposition'<span class="cs1-kern-right"></span>"</a>. <i><a href="/wiki/BBC_News_Online" title="BBC News Online">BBC News Online</a></i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180822030117/https://www.bbc.co.uk/news/uk-34529237">Archived</a> from the original on 22 August 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">21 June</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=BBC+News+Online&rft.atitle=UK+firm%27s+surveillance+kit+%27used+to+crush+Uganda+opposition%27&rft.date=2015-10-15&rft.au=Nick+Hopkins&rft.au=Jake+Morris&rft_id=https%3A%2F%2Fwww.bbc.co.uk%2Fnews%2Fuk-34529237&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://insiderpaper.com/germany-charges-four-for-selling-spyware-to-turkey/">"Germany charges four for selling spyware to Turkey"</a>. 22 May 2023. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230523031728/https://insiderpaper.com/germany-charges-four-for-selling-spyware-to-turkey//">Archived</a> from the original on 23 May 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">23 May</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Germany+charges+four+for+selling+spyware+to+Turkey&rft.date=2023-05-22&rft_id=https%3A%2F%2Finsiderpaper.com%2Fgermany-charges-four-for-selling-spyware-to-turkey%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.informationweek.com/security/vulnerabilities/finfisher-mobile-spyware-tracking-politi/240006620">"FinFisher Mobile Spyware Tracking Political Activists"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130517150646/http://www.informationweek.com/security/vulnerabilities/finfisher-mobile-spyware-tracking-politi/240006620">Archived</a> 2013-05-17 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, Mathew J. Schwartz, <i>Information Week</i>, 31 August 2012</span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://bits.blogs.nytimes.com/2013/03/13/researchers-find-25-countries-using-surveillance-software/">"Researchers Find 25 Countries Using Surveillance Software"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130314010247/http://bits.blogs.nytimes.com/2013/03/13/researchers-find-25-countries-using-surveillance-software/">Archived</a> 2013-03-14 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, Nicole Perlroth, <i>The New York Times</i>, 15 March 2013</span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://citizenlab.org/2013/04/for-their-eyes-only-2/">"For Their Eyes Only: The Commercialization of Digital Spying"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130504022318/https://citizenlab.org/2013/04/for-their-eyes-only-2/">Archived</a> 2013-05-04 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, Morgan Marquis-Boire with Bill Marczak, Claudio Guarnieri, and John Scott-Railton, Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 1 May 2013</span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://blog.mozilla.org/blog/2013/04/30/protecting-our-brand-from-a-global-spyware-provider/">"Protecting our brand from a global spyware provider"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130502185532/http://blog.mozilla.org/blog/2013/04/30/protecting-our-brand-from-a-global-spyware-provider/">Archived</a> 2013-05-02 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, Mozilla Foundation, April 30, 2013</span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.jdjournal.com/2013/05/01/mozilla-fights-against-spyware-company-and-its-exploits/">"June, Daniel, "Mozilla Fights Against Spyware Company and its Exploits"<span class="cs1-kern-right"></span>"</a>. May 2013. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130703110452/http://www.jdjournal.com/2013/05/01/mozilla-fights-against-spyware-company-and-its-exploits/">Archived</a> from the original on 2013-07-03<span class="reference-accessdate">. Retrieved <span class="nowrap">2013-05-08</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=June%2C+Daniel%2C+%22Mozilla+Fights+Against+Spyware+Company+and+its+Exploits%22&rft.date=2013-05&rft_id=http%3A%2F%2Fwww.jdjournal.com%2F2013%2F05%2F01%2Fmozilla-fights-against-spyware-company-and-its-exploits%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-pcmag-36"><span class="mw-cite-backlink">^ <a href="#cite_ref-pcmag_36-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-pcmag_36-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSara_Yin2012" class="citation web cs1">Sara Yin (August 30, 2012). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120903002249/http://securitywatch.pcmag.com/none/302174-lessons-learnt-from-finfisher-mobile-spyware">"Lessons Learnt From FinFisher Mobile Spyware"</a>. <a href="/wiki/PC_Magazine" class="mw-redirect" title="PC Magazine">PC Magazine</a>. Archived from <a rel="nofollow" class="external text" href="http://securitywatch.pcmag.com/none/302174-lessons-learnt-from-finfisher-mobile-spyware">the original</a> on September 3, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">September 3,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Lessons+Learnt+From+FinFisher+Mobile+Spyware&rft.pub=PC+Magazine&rft.date=2012-08-30&rft.au=Sara+Yin&rft_id=http%3A%2F%2Fsecuritywatch.pcmag.com%2Fnone%2F302174-lessons-learnt-from-finfisher-mobile-spyware&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-ESET1-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-ESET1_37-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCameron_Camp2012" class="citation web cs1">Cameron Camp (August 31, 2012). <a rel="nofollow" class="external text" href="https://www.welivesecurity.com/2012/08/30/finfisher-helps-people-spy-on-you-via-your-cellphone-for-good-or-evil/">"FinSpy and FinFisher spy on you via your cellphone and PC, for good or evil?"</a>. WeLiveSecurity. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20171005062858/https://www.welivesecurity.com/2012/08/30/finfisher-helps-people-spy-on-you-via-your-cellphone-for-good-or-evil/">Archived</a> from the original on October 5, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">July 25,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=FinSpy+and+FinFisher+spy+on+you+via+your+cellphone+and+PC%2C+for+good+or+evil%3F&rft.pub=WeLiveSecurity&rft.date=2012-08-31&rft.au=Cameron+Camp&rft_id=https%3A%2F%2Fwww.welivesecurity.com%2F2012%2F08%2F30%2Ffinfisher-helps-people-spy-on-you-via-your-cellphone-for-good-or-evil%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-ESET2-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-ESET2_38-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDavid_Harley2012" class="citation web cs1">David Harley (August 31, 2012). <a rel="nofollow" class="external text" href="https://www.welivesecurity.com/2012/08/31/finfisher-and-the-ethics-of-detection/">"Finfisher and the Ethics of Detection"</a>. WeLiveSecurity. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20171222051615/https://www.welivesecurity.com/2012/08/31/finfisher-and-the-ethics-of-detection/">Archived</a> from the original on December 22, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">July 25,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Finfisher+and+the+Ethics+of+Detection&rft.pub=WeLiveSecurity&rft.date=2012-08-31&rft.au=David+Harley&rft_id=https%3A%2F%2Fwww.welivesecurity.com%2F2012%2F08%2F31%2Ffinfisher-and-the-ethics-of-detection%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-IW-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-IW_39-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMathew_J._Schwartz2012" class="citation web cs1">Mathew J. Schwartz (August 31, 2012). <a rel="nofollow" class="external text" href="http://www.informationweek.com/tech-center/mobile-security/finfisher-mobile-spyware-tracking-politi/240006620">"FinFisher Mobile Spyware Tracking Political Activists"</a>. <a href="/wiki/Information_Week" class="mw-redirect" title="Information Week">Information Week</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131013044652/http://www.informationweek.com/tech-center/mobile-security/finfisher-mobile-spyware-tracking-politi/240006620">Archived</a> from the original on October 13, 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">September 3,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=FinFisher+Mobile+Spyware+Tracking+Political+Activists&rft.pub=Information+Week&rft.date=2012-08-31&rft.au=Mathew+J.+Schwartz&rft_id=http%3A%2F%2Fwww.informationweek.com%2Ftech-center%2Fmobile-security%2Ffinfisher-mobile-spyware-tracking-politi%2F240006620&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> <li id="cite_note-Dawn-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-Dawn_40-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.dw.com/en/german-prosecutors-investigate-spyware-maker-finfisher/a-50293812">"German prosecutors investigate spyware maker FinFisher | DW | 05.09.2019"</a>. Dawn. September 5, 2019. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190906200018/https://www.dw.com/en/german-prosecutors-investigate-spyware-maker-finfisher/a-50293812">Archived</a> from the original on September 6, 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">September 5,</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=German+prosecutors+investigate+spyware+maker+FinFisher+%26%23124%3B+DW+%26%23124%3B+05.09.2019&rft.pub=Dawn&rft.date=2019-09-05&rft_id=https%3A%2F%2Fwww.dw.com%2Fen%2Fgerman-prosecutors-investigate-spyware-maker-finfisher%2Fa-50293812&rfr_id=info%3Asid%2Fen.wikipedia.org%3AFinFisher" class="Z3988"></span></span> </li> </ol></div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=FinFisher&action=edit&section=9" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><span class="noviewer" typeof="mw:File"><a href="/wiki/File:Commons-logo.svg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/12px-Commons-logo.svg.png" decoding="async" width="12" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/18px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/24px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></a></span> Media related to <a href="https://commons.wikimedia.org/wiki/Category:FinFisher" class="extiw" title="commons:Category:FinFisher">FinFisher</a> at Wikimedia Commons </p> <ul><li><span class="official-website"><span class="url"><a rel="nofollow" class="external text" href="http://www.finfisher.com/FinFisher/index.html">Official website</a></span></span></li></ul> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Hacking_in_the_2010s" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Hacking_in_the_2010s" title="Template:Hacking in the 2010s"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Hacking_in_the_2010s" title="Template talk:Hacking in the 2010s"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Hacking_in_the_2010s" title="Special:EditPage/Template:Hacking in the 2010s"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Hacking_in_the_2010s" style="font-size:114%;margin:0 4em">Hacking in the 2010s</div></th></tr><tr><td class="navbox-abovebelow" colspan="2"><div><table style="width:100%; margin:1px; display:inline-table;"><tbody><tr> <td style="text-align:left; vertical-align:middle; padding:0 0.5em 0 0;" class="noprint">← <a href="/wiki/Template:Hacking_in_the_2000s" title="Template:Hacking in the 2000s">2000s</a></td> <td style="text-align:center; vertical-align:middle;; padding:0 1px;" class=""><a href="/wiki/Timeline_of_computer_security_hacker_history#2010s" class="mw-redirect" title="Timeline of computer security hacker history">Timeline</a></td> <td style="text-align:right; vertical-align:middle;; padding:0 0 0 0.5em;" class="noprint"><a href="/wiki/Template:Hacking_in_the_2020s" title="Template:Hacking in the 2020s">2020s</a> →</td> </tr></tbody></table></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Major incidents</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%">2010</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Operation_Aurora" title="Operation Aurora">Operation Aurora</a> (publication of 2009 events)</li> <li><a href="/wiki/February_2010_Australian_cyberattacks" title="February 2010 Australian cyberattacks">Australian cyberattacks</a></li> <li><a href="/wiki/Operation_Olympic_Games" title="Operation Olympic Games">Operation Olympic Games</a></li> <li><a href="/wiki/Shadow_Network" title="Shadow Network">Operation ShadowNet</a></li> <li><a href="/wiki/Operation_Payback" title="Operation Payback">Operation Payback</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2011</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/2011_Canadian_government_hackings" title="2011 Canadian government hackings">Canadian government</a></li> <li><a href="/wiki/DigiNotar" title="DigiNotar">DigiNotar</a></li> <li><a href="/wiki/DNSChanger" title="DNSChanger">DNSChanger</a></li> <li><a href="/wiki/HBGary" title="HBGary">HBGary Federal</a></li> <li><a href="/wiki/Operation_AntiSec" title="Operation AntiSec">Operation AntiSec</a></li> <li><a href="/wiki/2011_PlayStation_Network_outage" title="2011 PlayStation Network outage">PlayStation network outage</a></li> <li><a href="/wiki/RSA_SecurID#March_2011_system_compromise" title="RSA SecurID">RSA SecurID compromise</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2012</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/2012_LinkedIn_hack" title="2012 LinkedIn hack">LinkedIn hack</a></li> <li><a href="/wiki/Stratfor_email_leak" title="Stratfor email leak">Stratfor email leak</a></li> <li><a href="/wiki/Operation_High_Roller" title="Operation High Roller">Operation High Roller</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2013</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/2013_South_Korea_cyberattack" title="2013 South Korea cyberattack">South Korea cyberattack</a></li> <li><a href="/wiki/Snapchat#December_2013_hack" title="Snapchat">Snapchat hack</a></li> <li><a href="/wiki/June_25_cyber_terror" class="mw-redirect" title="June 25 cyber terror">Cyberterrorism attack of June 25</a></li> <li><a href="/wiki/Yahoo!_data_breaches#August_2013:_breach" class="mw-redirect" title="Yahoo! data breaches">2013 Yahoo! data breach</a></li> <li><a href="/wiki/2013_Singapore_cyberattacks" title="2013 Singapore cyberattacks">Singapore cyberattacks</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2014</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anthem_medical_data_breach" title="Anthem medical data breach">Anthem medical data breach</a></li> <li><a href="/wiki/Operation_Tovar" title="Operation Tovar">Operation Tovar</a></li> <li><a href="/wiki/2014_celebrity_nude_photo_leak" title="2014 celebrity nude photo leak">2014 celebrity nude photo leak</a></li> <li><a href="/wiki/2014_JPMorgan_Chase_data_breach" title="2014 JPMorgan Chase data breach">2014 JPMorgan Chase data breach</a></li> <li><a href="/wiki/2014_Sony_Pictures_hack" title="2014 Sony Pictures hack">2014 Sony Pictures hack</a></li> <li><a href="/wiki/2014_Russian_hacker_password_theft" title="2014 Russian hacker password theft">Russian hacker password theft</a></li> <li><a href="/wiki/Yahoo!_data_breaches#Late_2014:_breach" class="mw-redirect" title="Yahoo! data breaches">2014 Yahoo! data breach</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2015</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Office_of_Personnel_Management_data_breach" title="Office of Personnel Management data breach">Office of Personnel Management data breach</a></li> <li><a href="/wiki/HackingTeam#2015_data_breach" title="HackingTeam">HackingTeam</a></li> <li><a href="/wiki/Ashley_Madison_data_breach" title="Ashley Madison data breach">Ashley Madison data breach</a></li> <li><a href="/wiki/VTech#2015_data_breach" title="VTech">VTech data breach</a></li> <li><a href="/wiki/2015_Ukraine_power_grid_hack" title="2015 Ukraine power grid hack">Ukrainian Power Grid Cyberattack</a></li> <li><a href="/wiki/2015%E2%80%932016_SWIFT_banking_hack" title="2015–2016 SWIFT banking hack">SWIFT banking hack</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2016</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bangladesh_Bank_robbery" title="Bangladesh Bank robbery">Bangladesh Bank robbery</a></li> <li><a href="/wiki/Hollywood_Presbyterian_Medical_Center#Ransomware" title="Hollywood Presbyterian Medical Center">Hollywood Presbyterian Medical Center ransomware incident</a></li> <li><a href="/wiki/Commission_on_Elections_data_breach" title="Commission on Elections data breach">Commission on Elections data breach</a></li> <li><a href="/wiki/Democratic_National_Committee_cyber_attacks" title="Democratic National Committee cyber attacks">Democratic National Committee cyber attacks</a></li> <li><a href="/wiki/Vietnamese_airports_hackings" title="Vietnamese airports hackings">Vietnam Airport Hacks</a></li> <li><a href="/wiki/Democratic_Congressional_Campaign_Committee_cyber_attacks" title="Democratic Congressional Campaign Committee cyber attacks">DCCC cyber attacks</a></li> <li><a href="/wiki/2016_Indian_Banks_data_breach" class="mw-redirect" title="2016 Indian Banks data breach">Indian Bank data breaches</a></li> <li><a href="/wiki/Surkov_leaks" title="Surkov leaks">Surkov leaks</a></li> <li><a href="/wiki/DDoS_attacks_on_Dyn" title="DDoS attacks on Dyn">Dyn cyberattack</a></li> <li><a href="/wiki/Russian_interference_in_the_2016_United_States_elections" title="Russian interference in the 2016 United States elections">Russian interference in the 2016 U.S. elections</a></li> <li><a href="/wiki/2016_Bitfinex_hack" title="2016 Bitfinex hack">2016 Bitfinex hack</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2017</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/SHA1#SHAttered_–_first_public_collision" class="mw-redirect" title="SHA1">SHAttered</a></li> <li><a href="/wiki/2017_Macron_e-mail_leaks" title="2017 Macron e-mail leaks">2017 Macron e-mail leaks</a></li> <li><a href="/wiki/WannaCry_ransomware_attack" title="WannaCry ransomware attack">WannaCry ransomware attack</a></li> <li><a href="/wiki/2017_Westminster_data_breach" title="2017 Westminster data breach">Westminster data breach</a></li> <li><a href="/wiki/Petya_(malware_family)" title="Petya (malware family)">Petya and NotPetya</a> <ul><li><a href="/wiki/2017_Ukraine_ransomware_attacks" title="2017 Ukraine ransomware attacks">2017 Ukraine ransomware attacks</a></li></ul></li> <li><a href="/wiki/2017_Equifax_data_breach" title="2017 Equifax data breach">Equifax data breach</a></li> <li><a href="/wiki/Deloitte#E-mail_hack" title="Deloitte">Deloitte breach</a></li> <li><a href="/wiki/Disqus#October_2017_security_breach" title="Disqus">Disqus breach</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2018</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Trustico#DigiCert_and_Trustico_spat,_2018" title="Trustico">Trustico</a></li> <li><a href="/wiki/Atlanta_government_ransomware_attack" title="Atlanta government ransomware attack">Atlanta cyberattack</a></li> <li><a href="/wiki/2018_SingHealth_data_breach" title="2018 SingHealth data breach">SingHealth data breach</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2019</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/2019_cyberattacks_on_Sri_Lanka" title="2019 cyberattacks on Sri Lanka">Sri Lanka cyberattack</a></li> <li><a href="/wiki/2019_Baltimore_ransomware_attack" title="2019 Baltimore ransomware attack">Baltimore ransomware attack</a></li> <li><a href="/wiki/2019_Bulgarian_revenue_agency_hack" class="mw-redirect" title="2019 Bulgarian revenue agency hack">Bulgarian revenue agency hack</a></li> <li><a href="/wiki/WhatsApp_snooping_scandal" title="WhatsApp snooping scandal">WhatsApp snooping scandal</a></li> <li><a href="/wiki/Jeff_Bezos_phone_hacking_incident" title="Jeff Bezos phone hacking incident">Jeff Bezos phone hacking incident</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Hacktivism" title="Hacktivism">Hacktivism</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anonymous_(hacker_group)" title="Anonymous (hacker group)">Anonymous</a> <ul><li><a href="/wiki/Timeline_of_events_associated_with_Anonymous" title="Timeline of events associated with Anonymous">associated events</a></li></ul></li> <li><a href="/wiki/CyberBerkut" title="CyberBerkut">CyberBerkut</a></li> <li><a href="/wiki/Gay_Nigger_Association_of_America" title="Gay Nigger Association of America">GNAA</a></li> <li><a href="/wiki/Goatse_Security" title="Goatse Security">Goatse Security</a></li> <li><a href="/wiki/Lizard_Squad" title="Lizard Squad">Lizard Squad</a></li> <li><a href="/wiki/LulzRaft" title="LulzRaft">LulzRaft</a></li> <li><a href="/wiki/LulzSec" title="LulzSec">LulzSec</a></li> <li><a href="/wiki/2016_Dyn_cyberattack#Perpetrators" class="mw-redirect" title="2016 Dyn cyberattack">New World Hackers</a></li> <li><a href="/wiki/NullCrew" title="NullCrew">NullCrew</a></li> <li><a href="/wiki/OurMine" title="OurMine">OurMine</a></li> <li><a href="/wiki/PayPal_14" title="PayPal 14">PayPal 14</a></li> <li><a href="/wiki/RedHack" title="RedHack">RedHack</a></li> <li><a href="/wiki/Teamp0ison" title="Teamp0ison">Teamp0ison</a></li> <li><a href="/wiki/The_Dark_Overlord_(hacker_group)" title="The Dark Overlord (hacker group)"> TDO </a></li> <li><a href="/wiki/UGNazi" title="UGNazi">UGNazi</a></li> <li><a href="/wiki/Ukrainian_Cyber_Alliance" title="Ukrainian Cyber Alliance">Ukrainian Cyber Alliance</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Advanced_persistent_threat" title="Advanced persistent threat">Advanced<br />persistent threats</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bangladesh_Black_Hat_Hackers" title="Bangladesh Black Hat Hackers">Bangladesh Black Hat Hackers</a></li> <li><a href="/wiki/Bureau_121" title="Bureau 121">Bureau 121</a></li> <li><a href="/wiki/Charming_Kitten" title="Charming Kitten">Charming Kitten</a></li> <li><a href="/wiki/Cozy_Bear" title="Cozy Bear">Cozy Bear</a></li> <li><a href="/wiki/Dark_Basin" title="Dark Basin">Dark Basin</a></li> <li><a href="/wiki/DarkMatter_Group" title="DarkMatter Group">DarkMatter</a></li> <li><a href="/wiki/Elfin_Team" title="Elfin Team">Elfin Team</a></li> <li><a href="/wiki/Equation_Group" title="Equation Group">Equation Group</a></li> <li><a href="/wiki/Fancy_Bear" title="Fancy Bear">Fancy Bear</a></li> <li><a href="/wiki/Stuxnet#History" title="Stuxnet">GOSSIPGIRL</a> (confederation)</li> <li><a href="/wiki/Guccifer_2.0" title="Guccifer 2.0">Guccifer 2.0</a></li> <li><a href="/wiki/Hacking_Team" class="mw-redirect" title="Hacking Team">Hacking Team</a></li> <li><a href="/wiki/Helix_Kitten" title="Helix Kitten">Helix Kitten</a></li> <li><a href="/wiki/Iranian_Cyber_Army" title="Iranian Cyber Army">Iranian Cyber Army</a></li> <li><a href="/wiki/Lazarus_Group" title="Lazarus Group">Lazarus Group</a> (<a href="/wiki/Lazarus_Group#BlueNorOff" title="Lazarus Group">BlueNorOff</a>) (<a href="/wiki/Lazarus_Group#AndAriel" title="Lazarus Group">AndAriel</a>)</li> <li><a href="/wiki/NSO_Group" title="NSO Group">NSO Group</a></li> <li><a href="/wiki/Numbered_Panda" title="Numbered Panda">Numbered Panda</a></li> <li><a href="/wiki/PLA_Unit_61398" title="PLA Unit 61398">PLA Unit 61398</a></li> <li><a href="/wiki/PLA_Unit_61486" title="PLA Unit 61486">PLA Unit 61486</a></li> <li><a href="/wiki/PLATINUM_(cybercrime_group)" title="PLATINUM (cybercrime group)">PLATINUM</a></li> <li><a href="/wiki/Pranknet" title="Pranknet">Pranknet</a></li> <li><a href="/wiki/Red_Apollo" title="Red Apollo">Red Apollo</a></li> <li><a href="/wiki/Rocket_Kitten" title="Rocket Kitten">Rocket Kitten</a></li> <li><a href="/wiki/Stealth_Falcon" title="Stealth Falcon">Stealth Falcon</a></li> <li><a href="/wiki/Syrian_Electronic_Army" title="Syrian Electronic Army">Syrian Electronic Army</a></li> <li><a href="/wiki/Tailored_Access_Operations" title="Tailored Access Operations">Tailored Access Operations</a></li> <li><a href="/wiki/The_Shadow_Brokers" title="The Shadow Brokers">The Shadow Brokers</a></li> <li><a href="/wiki/XDedic" title="XDedic">xDedic</a></li> <li><a href="/wiki/Yemen_Cyber_Army" title="Yemen Cyber Army">Yemen Cyber Army</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Hacker" title="Hacker">Individuals</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Ryan_Ackroyd" title="Ryan Ackroyd">Ryan Ackroyd</a></li> <li><a href="/wiki/Mustafa_Al-Bassam" title="Mustafa Al-Bassam">Mustafa Al-Bassam</a></li> <li><a href="/wiki/Cyber_Anakin" title="Cyber Anakin">Cyber Anakin</a></li> <li><a href="/wiki/George_Hotz" title="George Hotz">George Hotz</a></li> <li><a href="/wiki/Guccifer" title="Guccifer">Guccifer</a></li> <li><a href="/wiki/Elliott_Gunton" title="Elliott Gunton">Elliott Gunton</a></li> <li><a href="/wiki/Jeremy_Hammond" title="Jeremy Hammond">Jeremy Hammond</a></li> <li><a href="/wiki/Kristoffer_von_Hassel" title="Kristoffer von Hassel">Kristoffer von Hassel</a></li> <li><a href="/wiki/Junaid_Hussain" title="Junaid Hussain">Junaid Hussain</a></li> <li><a href="/wiki/MLT_(hacktivist)" title="MLT (hacktivist)">MLT</a></li> <li><a href="/wiki/Hector_Monsegur" title="Hector Monsegur">Sabu</a></li> <li><a href="/wiki/Roman_Seleznev" title="Roman Seleznev">Track2</a></li> <li><a href="/wiki/Topiary_(hacktivist)" title="Topiary (hacktivist)">Topiary</a></li> <li><a href="/wiki/The_Jester_(hacktivist)" title="The Jester (hacktivist)">The Jester</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Major <a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">vulnerabilities</a><br />publicly <a href="/wiki/Full_disclosure_(computer_security)" title="Full disclosure (computer security)">disclosed</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Evercookie" title="Evercookie">Evercookie</a> (2010)</li> <li><a href="/wiki/ISeeYou" title="ISeeYou">iSeeYou</a> (2013)</li> <li><a href="/wiki/Heartbleed" title="Heartbleed"> Heartbleed</a> (2014)</li> <li><a href="/wiki/Shellshock_(software_bug)" title="Shellshock (software bug)">Shellshock</a> (2014)</li> <li><a href="/wiki/POODLE" title="POODLE">POODLE</a> (2014)</li> <li><a href="/wiki/Rootpipe" title="Rootpipe">Rootpipe</a> (2014)</li> <li><a href="/wiki/Row_hammer" title="Row hammer">Row hammer</a> (2014)</li> <li><a href="/wiki/Signaling_System_No._7#Protocol_security_vulnerabilities" class="mw-redirect" title="Signaling System No. 7">SS7 vulnerabilities</a> (2014)</li> <li><a href="/wiki/WinShock" title="WinShock">WinShock</a> (2014)</li> <li><a href="/wiki/JASBUG" title="JASBUG">JASBUG</a> (2015)</li> <li><a href="/wiki/Stagefright_(bug)" title="Stagefright (bug)">Stagefright</a> (2015)</li> <li><a href="/wiki/DROWN_attack" title="DROWN attack">DROWN</a> (2016)</li> <li><a href="/wiki/Badlock" title="Badlock">Badlock</a> (2016)</li> <li><a href="/wiki/Dirty_COW" title="Dirty COW">Dirty COW</a> (2016)</li> <li><a href="/wiki/Cloudbleed" title="Cloudbleed">Cloudbleed</a> (2017)</li> <li><a href="/wiki/Broadcom_Corporation#soc-wifi-vulns" title="Broadcom Corporation">Broadcom Wi-Fi</a> (2017)</li> <li><a href="/wiki/EternalBlue" title="EternalBlue">EternalBlue</a> (2017)</li> <li><a href="/wiki/DoublePulsar" title="DoublePulsar">DoublePulsar</a> (2017)</li> <li><a href="/wiki/Intel_Active_Management_Technology#Silent_Bob_is_Silent" title="Intel Active Management Technology">Silent Bob is Silent</a> (2017)</li> <li><a href="/wiki/KRACK" title="KRACK">KRACK</a> (2017)</li> <li><a href="/wiki/ROCA_vulnerability" title="ROCA vulnerability">ROCA vulnerability</a> (2017)</li> <li><a href="/wiki/BlueBorne_(security_vulnerability)" title="BlueBorne (security vulnerability)">BlueBorne</a> (2017)</li> <li><a href="/wiki/Meltdown_(security_vulnerability)" title="Meltdown (security vulnerability)">Meltdown</a> (2018)</li> <li><a href="/wiki/Spectre_(security_vulnerability)" title="Spectre (security vulnerability)">Spectre</a> (2018)</li> <li><a href="/wiki/EFAIL" title="EFAIL">EFAIL</a> (2018)</li> <li><a href="/wiki/Exactis" title="Exactis">Exactis</a> (2018)</li> <li><a href="/wiki/Speculative_Store_Bypass" title="Speculative Store Bypass">Speculative Store Bypass</a> (2018)</li> <li><a href="/wiki/Lazy_FP_state_restore" title="Lazy FP state restore">Lazy FP state restore</a> (2018)</li> <li><a href="/wiki/TLBleed" title="TLBleed">TLBleed</a> (2018)</li> <li><a href="/wiki/SigSpoof" title="SigSpoof">SigSpoof</a> (2018)</li> <li><a href="/wiki/Foreshadow" title="Foreshadow">Foreshadow</a> (2018)</li> <li><a href="/wiki/Wi-Fi_Protected_Access#Dragonblood_attack" title="Wi-Fi Protected Access">Dragonblood</a> (2019)</li> <li><a href="/wiki/Microarchitectural_Data_Sampling" title="Microarchitectural Data Sampling">Microarchitectural Data Sampling</a> (2019)</li> <li><a href="/wiki/BlueKeep" title="BlueKeep">BlueKeep</a> (2019)</li> <li><a href="/wiki/Kr00k" title="Kr00k">Kr00k</a> (2019)</li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Malware" title="Malware">Malware</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%">2010</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Ransomware#Bad_Rabbit" title="Ransomware">Bad Rabbit</a></li> <li><a href="/wiki/BlackEnergy#BlackEnergy_2_(BE2)" title="BlackEnergy"> Black Energy 2</a></li> <li><a href="/wiki/SpyEye" title="SpyEye">SpyEye</a></li> <li><a href="/wiki/Stuxnet" title="Stuxnet">Stuxnet</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2011</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Coreflood" title="Coreflood">Coreflood</a></li> <li><a href="/wiki/Alureon" title="Alureon">Alureon</a></li> <li><a href="/wiki/Duqu" title="Duqu">Duqu</a></li> <li><a href="/wiki/Kelihos_botnet" title="Kelihos botnet">Kelihos</a></li> <li><a href="/wiki/Metulji_botnet" title="Metulji botnet">Metulji botnet</a></li> <li><a href="/wiki/Stars_virus" title="Stars virus">Stars</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2012</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Carna_botnet" title="Carna botnet">Carna</a></li> <li><a href="/wiki/Dexter_(malware)" title="Dexter (malware)">Dexter</a></li> <li><a href="/wiki/FBI_MoneyPak_Ransomware" title="FBI MoneyPak Ransomware">FBI</a></li> <li><a href="/wiki/Flame_(malware)" title="Flame (malware)">Flame</a></li> <li><a href="/wiki/Mahdi_(malware)" title="Mahdi (malware)">Mahdi</a></li> <li><a href="/wiki/Red_October_(malware)" title="Red October (malware)">Red October</a></li> <li><a href="/wiki/Shamoon" title="Shamoon">Shamoon</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2013</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/CryptoLocker" title="CryptoLocker">CryptoLocker</a></li> <li><a href="/wiki/2013_South_Korea_cyberattack" title="2013 South Korea cyberattack">DarkSeoul</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2014</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Brambul" title="Brambul">Brambul</a></li> <li><a href="/wiki/BlackEnergy#BlackEnergy_3_(BE3)" title="BlackEnergy"> Black Energy 3</a></li> <li><a href="/wiki/Carbanak" title="Carbanak">Carbanak</a></li> <li><a href="/wiki/Careto_(malware)" title="Careto (malware)">Careto</a></li> <li><a href="/wiki/DarkHotel" title="DarkHotel">DarkHotel</a></li> <li><a href="/wiki/Duqu_2.0" title="Duqu 2.0">Duqu 2.0</a></li> <li><a class="mw-selflink selflink">FinFisher</a></li> <li><a href="/wiki/Gameover_ZeuS" title="Gameover ZeuS">Gameover ZeuS</a></li> <li><a href="/wiki/Regin_(malware)" title="Regin (malware)">Regin</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2015</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Dridex" title="Dridex">Dridex</a></li> <li><a href="/wiki/Hidden_Tear" title="Hidden Tear">Hidden Tear</a></li> <li><a href="/wiki/Rombertik" title="Rombertik">Rombertik</a></li> <li><a href="/wiki/TeslaCrypt" title="TeslaCrypt">TeslaCrypt</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2016</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Hitler-Ransomware" title="Hitler-Ransomware">Hitler</a></li> <li><a href="/wiki/Jigsaw_(ransomware)" title="Jigsaw (ransomware)">Jigsaw</a></li> <li><a href="/wiki/KeRanger" title="KeRanger">KeRanger</a></li> <li><a href="/wiki/Necurs" class="mw-redirect" title="Necurs">Necurs</a></li> <li><a href="/wiki/MEMZ" title="MEMZ">MEMZ</a></li> <li><a href="/wiki/Mirai_(malware)" title="Mirai (malware)">Mirai</a></li> <li><a href="/wiki/Pegasus_(spyware)" title="Pegasus (spyware)">Pegasus</a></li> <li><a href="/wiki/Petya_and_NotPetya" class="mw-redirect" title="Petya and NotPetya">Petya and NotPetya</a></li> <li><a href="/wiki/X-Agent" title="X-Agent">X-Agent</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2017</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/BrickerBot" title="BrickerBot">BrickerBot</a></li> <li><a href="/wiki/Kirk_Ransomware" title="Kirk Ransomware">Kirk</a></li> <li><a href="/wiki/LogicLocker" title="LogicLocker">LogicLocker</a></li> <li><a href="/wiki/Rensenware" title="Rensenware">Rensenware</a></li> <li><a href="/wiki/Triton_(malware)" title="Triton (malware)">Triton</a></li> <li><a href="/wiki/WannaCry_ransomware_attack" title="WannaCry ransomware attack">WannaCry</a></li> <li><a href="/wiki/Xafecopy_Trojan" title="Xafecopy Trojan">XafeCopy</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2018</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/VPNFilter" title="VPNFilter">VPNFilter</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">2019</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Grum_botnet" title="Grum botnet">Grum</a></li> <li><a href="/wiki/Joanap" title="Joanap">Joanap</a></li> <li><a href="/wiki/NetTraveler" title="NetTraveler">NetTraveler</a></li> <li><a href="/wiki/Chaos_Computer_Club#Staatstrojaner_affair" title="Chaos Computer Club">R2D2</a></li> <li><a href="/wiki/Tiny_Banker_Trojan" title="Tiny Banker Trojan">Tinba</a></li> <li><a href="/wiki/Titanium_(malware)" title="Titanium (malware)">Titanium</a></li> <li><a href="/wiki/ZeroAccess_botnet" title="ZeroAccess botnet">ZeroAccess botnet</a></li></ul> </div></td></tr></tbody></table><div></div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Malware_topics" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Malware" title="Template:Malware"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Malware" title="Template talk:Malware"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Malware" title="Special:EditPage/Template:Malware"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Malware_topics" style="font-size:114%;margin:0 4em"><a href="/wiki/Malware" title="Malware">Malware</a> topics</div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Infectious malware</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Comparison_of_computer_viruses" title="Comparison of computer viruses">Comparison of computer viruses</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Computer virus</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Computer worm</a></li> <li><a href="/wiki/List_of_computer_worms" title="List of computer worms">List of computer worms</a></li> <li><a href="/wiki/Timeline_of_computer_viruses_and_worms" title="Timeline of computer viruses and worms">Timeline of computer viruses and worms</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Concealment</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoor</a></li> <li><a href="/wiki/Clickjacking" title="Clickjacking">Clickjacking</a></li> <li><a href="/wiki/Man-in-the-browser" title="Man-in-the-browser">Man-in-the-browser</a></li> <li><a href="/wiki/Man-in-the-middle_attack" title="Man-in-the-middle attack">Man-in-the-middle</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkit</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horse</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie computer</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Malware for profit</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnet</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Fleeceware" title="Fleeceware">Fleeceware</a></li> <li><a href="/wiki/Form_grabbing" title="Form grabbing">Form grabbing</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialer</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke logging</a></li> <li><a href="/wiki/Internet_bot#Malicious_purposes" title="Internet bot">Malbot</a></li> <li><a href="/wiki/Privacy-invasive_software" title="Privacy-invasive software">Privacy-invasive software</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Web_threat" title="Web threat">Web threats</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">By operating system</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Category:Android_(operating_system)_malware" title="Category:Android (operating system) malware">Android malware</a></li> <li><a href="/wiki/Category:Classic_Mac_OS_viruses" title="Category:Classic Mac OS viruses">Classic Mac OS viruses</a></li> <li><a href="/wiki/Category:IOS_malware" title="Category:IOS malware">iOS malware</a></li> <li><a href="/wiki/Linux_malware" title="Linux malware">Linux malware</a></li> <li><a href="/wiki/Category:MacOS_malware" title="Category:MacOS malware">MacOS malware</a></li> <li><a href="/wiki/Macro_virus" title="Macro virus">Macro virus</a></li> <li><a href="/wiki/Mobile_malware" title="Mobile malware">Mobile malware</a></li> <li><a href="/wiki/Palm_OS_viruses" title="Palm OS viruses">Palm OS viruses</a></li> <li><a href="/wiki/HyperCard_viruses" class="mw-redirect" title="HyperCard viruses">HyperCard viruses</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Protection</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anti-keylogger" title="Anti-keylogger">Anti-keylogger</a></li> <li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Browser_security" title="Browser security">Browser security</a></li> <li><a href="/wiki/Data_loss_prevention_software" title="Data loss prevention software">Data loss prevention software</a></li> <li><a href="/wiki/Defensive_computing" title="Defensive computing">Defensive computing</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Countermeasures</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_and_network_surveillance" title="Computer and network surveillance">Computer and network surveillance</a></li> <li><a href="/wiki/Honeypot_(computing)" title="Honeypot (computing)">Honeypot</a></li> <li><a href="/wiki/Operation:_Bot_Roast" title="Operation: Bot Roast">Operation: Bot Roast</a></li></ul> </div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐f69cdc8f6‐sw5fn Cached time: 20241122145238 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 0.620 seconds Real time usage: 0.800 seconds Preprocessor visited node count: 3231/1000000 Post‐expand include size: 160640/2097152 bytes Template argument size: 3778/2097152 bytes Highest expansion depth: 15/100 Expensive parser function count: 3/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 165943/5000000 bytes Lua time usage: 0.364/10.000 seconds Lua memory usage: 5973759/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 678.290 1 -total 53.01% 359.582 1 Template:Reflist 27.90% 189.226 16 Template:Cite_news 17.00% 115.282 4 Template:Navbox 16.13% 109.404 1 Template:Hacking_in_the_2010s 12.37% 83.922 22 Template:Cite_web 11.50% 77.980 1 Template:Short_description 7.54% 51.153 1 Template:Dead_link 6.85% 46.430 1 Template:Fix 6.58% 44.648 2 Template:Pagetype --> <!-- Saved in parser cache with key enwiki:pcache:idhash:33894169-0!canonical and timestamp 20241122145238 and revision id 1256012567. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=FinFisher&oldid=1256012567">https://en.wikipedia.org/w/index.php?title=FinFisher&oldid=1256012567</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Computer_security_software" title="Category:Computer security software">Computer security software</a></li><li><a href="/wiki/Category:Spyware" title="Category:Spyware">Spyware</a></li><li><a href="/wiki/Category:Computer_surveillance" title="Category:Computer surveillance">Computer surveillance</a></li><li><a href="/wiki/Category:Trojan_horses" title="Category:Trojan horses">Trojan horses</a></li><li><a href="/wiki/Category:Espionage_techniques" title="Category:Espionage techniques">Espionage techniques</a></li><li><a href="/wiki/Category:Espionage_devices" title="Category:Espionage devices">Espionage devices</a></li><li><a href="/wiki/Category:Malware_toolkits" title="Category:Malware toolkits">Malware toolkits</a></li><li><a href="/wiki/Category:2012_in_computing" title="Category:2012 in computing">2012 in computing</a></li><li><a href="/wiki/Category:Computer_access_control" title="Category:Computer access control">Computer access control</a></li><li><a href="/wiki/Category:Cyberwarfare" title="Category:Cyberwarfare">Cyberwarfare</a></li><li><a href="/wiki/Category:Espionage_scandals_and_incidents" title="Category:Espionage scandals and incidents">Espionage scandals and incidents</a></li><li><a href="/wiki/Category:Content-control_software" title="Category:Content-control software">Content-control software</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:CS1_German-language_sources_(de)" title="Category:CS1 German-language sources (de)">CS1 German-language sources (de)</a></li><li><a href="/wiki/Category:CS1_Arabic-language_sources_(ar)" title="Category:CS1 Arabic-language sources (ar)">CS1 Arabic-language sources (ar)</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_matches_Wikidata" title="Category:Short description matches Wikidata">Short description matches Wikidata</a></li><li><a href="/wiki/Category:All_articles_with_dead_external_links" title="Category:All articles with dead external links">All articles with dead external links</a></li><li><a href="/wiki/Category:Articles_with_dead_external_links_from_April_2019" title="Category:Articles with dead external links from April 2019">Articles with dead external links from April 2019</a></li><li><a href="/wiki/Category:Commons_category_link_from_Wikidata" title="Category:Commons category link from Wikidata">Commons category link from Wikidata</a></li><li><a href="/wiki/Category:Official_website_different_in_Wikidata_and_Wikipedia" title="Category:Official website different in Wikidata and Wikipedia">Official website different in Wikidata and Wikipedia</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 7 November 2024, at 19:53<span class="anonymous-show"> (UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=FinFisher&mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-nhjg5","wgBackendResponseTime":171,"wgPageParseReport":{"limitreport":{"cputime":"0.620","walltime":"0.800","ppvisitednodes":{"value":3231,"limit":1000000},"postexpandincludesize":{"value":160640,"limit":2097152},"templateargumentsize":{"value":3778,"limit":2097152},"expansiondepth":{"value":15,"limit":100},"expensivefunctioncount":{"value":3,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":165943,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 678.290 1 -total"," 53.01% 359.582 1 Template:Reflist"," 27.90% 189.226 16 Template:Cite_news"," 17.00% 115.282 4 Template:Navbox"," 16.13% 109.404 1 Template:Hacking_in_the_2010s"," 12.37% 83.922 22 Template:Cite_web"," 11.50% 77.980 1 Template:Short_description"," 7.54% 51.153 1 Template:Dead_link"," 6.85% 46.430 1 Template:Fix"," 6.58% 44.648 2 Template:Pagetype"]},"scribunto":{"limitreport-timeusage":{"value":"0.364","limit":"10.000"},"limitreport-memusage":{"value":5973759,"limit":52428800}},"cachereport":{"origin":"mw-web.codfw.main-f69cdc8f6-sw5fn","timestamp":"20241122145238","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"FinFisher","url":"https:\/\/en.wikipedia.org\/wiki\/FinFisher","sameAs":"http:\/\/www.wikidata.org\/entity\/Q12432991","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q12432991","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2011-11-28T16:27:08Z","dateModified":"2024-11-07T19:53:26Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/4\/4c\/Finfisher_spyware.jpg","headline":"surveillance software"}</script> </body> </html>