• Actual
  • Law and the media
  • Helpful
  • Work areas and campaigns
  • Reviews and monitoring
  • RSF uncovers new spyware from Belarus

    Reporters With­out Bor­ders (RSF)’s Dig­i­tal Secu­ri­ty Lab (DSL), work­ing with the East­ern Euro­pean organ­i­sa­tion RESIDENT.NGO, has uncov­ered a pre­vi­ous­ly unknown spy­ware tool used by the State Secu­ri­ty Com­mit­tee (KGB) of Belarus to tar­get, among oth­ers, jour­nal­ists and media work­ers. RSF assess­es that this expo­sure is a seri­ous set­back for the KGB’s oper­a­tions, not least because the soft­ware appears to have been in use for sev­er­al years.

    Image cre­at­ed by BAJ with the help of Chat­G­PT

     

    “By deploy­ing sur­veil­lance tech­nolo­gies such as Res­i­dent­Bat, the Belaru­sian state is pur­su­ing a delib­er­ate strat­e­gy of repres­sion against inde­pen­dent jour­nal­ism. These tools have noth­ing to do with nation­al secu­ri­ty as alleged by press free­dom preda­tor Loukachenko, instead they have every­thing to do with intim­i­da­tion and silenc­ing of jour­nal­ists. The sys­tem­at­ic inva­sion of their pri­vate and pro­fes­sion­al lives amounts to a direct and unlaw­ful assault on press free­dom and fun­da­men­tal rights. An inter­na­tion­al ban on such inva­sive and per­verse tech­nolo­gies has been long over­due, as effec­tive pros­e­cu­tion of such crimes against jour­nal­ists.

    Antoine Bernard
    Direc­tor, Advo­ca­cy & Assis­tance

    Spyware masquerading as a regular app

    Res­i­dent­Bat was detect­ed on the smart­phone of a jour­nal­ist who had been ques­tioned by the KGB. RSF has ver­i­fied the person’s iden­ti­ty but is not pub­lish­ing it for secu­ri­ty rea­sons.

    Before the inter­ro­ga­tion at KGB premis­es, the indi­vid­ual was asked to place the smart­phone in a lock­er. Dur­ing ques­tion­ing, the jour­nal­ist was required to show con­tent on the device and unlocked the phone in an officer’s pres­ence. After­wards, the device was placed in the lock­er again. The indi­vid­ual and RSF believe that the secu­ri­ty forces observed the PIN entry, retrieved the phone dur­ing the inter­ro­ga­tion and installed the spy­ware.

    A few days lat­er, antivirus soft­ware flagged sus­pi­cious com­po­nents on the device. The indi­vid­ual con­tact­ed RESIDENT.NGO, which car­ried out a foren­sic analy­sis togeth­er with RSF’s DSL.

    In use for years

    By com­par­ing sam­ples on an antivirus plat­form, RSF’s DSL iden­ti­fied addi­tion­al Res­i­dent­Bat vari­ants like­ly used by the same actor. One analysed ver­sion dates back to 2021. RSF there­fore believes that the KGB has been using the spy­ware for at least four years. RSF has shared the result of its research with Google. In order to fur­ther pro­tect tar­get­ed indi­vid­u­als, the tech giant will send a “gov­ern­ment-backed attack” threat noti­fi­ca­tion to all Google users who were iden­ti­fied by Google as tar­gets of this spy­ware cam­paign.

    It is not yet clear who devel­oped Res­i­dent­Bat. Parts of the code con­tain Eng­lish-lan­guage strings, sug­gest­ing it may be a prod­uct not designed exclu­sive­ly for use in Belarus, or devel­oped by a third par­ty. 

    The full tech­ni­cal report is avail­able here

    The most important news and materials in our Telegram channel — subscribe!
    @bajmedia
    Most read
    Every day send to your mailbox: actual offers (grants, vacancies, competitions, scholarships), announcements of events (lectures, performances, presentations, press conferences) and good content.
    By subscribing to the newsletter, you agree to the Privacy Policy