A group of 11 nations including the United States issued the first-ever significant anti-spyware declaration in April 2023. In this article, you can read more about the significant declaration, a topic relevant for the IAS exam current affairs segment.
Anti-Spyware Declaration
- Nations involved: The declaration involved a group of countries including Australia, Denmark, France, Canada, Norway, Sweden, Costa Rica, New Zealand, Switzerland, the United Kingdom, and the United States.Â
- The declaration outlined their commitment to taking specific measures to counter the marketability of spyware.
- As part of the declaration, the nations committed to adhering to their own legal, regulatory, and policy measures, as well as current export control systems, to obstruct the dissemination of software, technology, and equipment to individuals who could exploit them for malicious cyber operations such as unauthorized penetration of information systems.
- According to a report from a US think tank, Israeli spyware, distributed by multiple groups, has captured a substantial portion of the worldwide spyware market.
What is Spyware?
Spyware is a type of software that exhibits harmful behaviour by clandestinely collecting sensitive information about an individual or an organization, and then transmitting it to a third party, resulting in detrimental effects for the user, such as compromising their privacy or compromising the security of their device.
Types of spywares:
- Attackers utilize different forms of spyware to infect users’ computers and devices. These spyware variations collect data on behalf of the attacker, with less advanced forms simply monitoring and transmitting data to a third party. However, more sophisticated and perilous types of spyware not only gather data but also alter a user’s system, leaving them vulnerable to additional threats.
- A few of the most commonly used spywares are mentioned below:
- Adware is a malicious program that resides on a device and monitors the user’s activities to sell their data to advertisers and malicious actors or serve up malicious ads.
- Infostealer refers to a form of spyware that scans devices in search of particular data and instant messaging conversations, with the purpose of collecting information from them.
- Keyloggers, which are alternatively referred to as keystroke loggers, are a form of infostealer spyware that captures all keystrokes made by a user on their compromised device, storing the information in an encrypted log file. This type of spyware is capable of gathering a wide range of data, such as email content, login details, SMS messages, and user IDs, by logging all input entered on the device.
- Rootkits enable attackers to deeply infiltrate devices by exploiting security vulnerabilities or logging into machines as an administrator. It can be challenging, and sometimes not feasible, to identify rootkits.
- Red Shell is a form of spyware that has the ability to be installed on a device during the installation process of certain PC games, subsequently monitoring the online activity of the user. Developers commonly utilize it to boost their games and enhance their marketing efforts.
- System monitors track user activity on their computer, capturing information like emails sent, social media and other sites visited, and keystrokes.
- Tracking cookies are small files dropped onto a device by a website and used to follow the user’s online activity.
- Trojan Horse Virus is a brand of spyware that enters a device through Trojan malware, which is responsible for delivering the spyware program.
Anti-Spyware Declaration [UPSC Notes]:- Download PDF Here
Related Links | |||
Pegasus Spyware | Zero Click Spyware | ||
Hermit Spyware | Global Cybersecurity | ||
Cybercrime | International Telecommunication Union (ITU) |
Comments