Turkmenistan and Oman may have installed active intrusion espionage systems in 2010, according to documents leaked by whistleblowing organisation Wikileaks in part 3 of its Spy Files.
Documents leaked on September 4 include a presentation deck made to Turkmenistan authorities by a company called Dreamlabs plugging FinFisher, a solution that includes both active infection and monitoring to both the country’s fixed-line (dial-up and ADSL) Turkmen Telecom and cellular TM Cell networks.
A subsequent quotation to fit both networks with infection nodes, monitoring equipment and support and training came out at exactly 847,819.70 Swiss Francs ($905,000).
The documents suggest that FinFisher goes beyond just passive monitoring of network traffic and includes tools to remotely infect target PCs over the LAN or via an infected USB drive as well as tools to break Windows password protection.
A leaked purchase order showed another similar project with two infection nodes sold to Oman for 408,743.55 Francs ($436,000) back in June, 2010.
Dreamlabs FinFisher tactical intrusion solutions start at €25,200 ($33,000). Remote infection tools cost another €25,000 for LAN-based intrusion or just €3,500 for five USB dongles, presumingly loaded with trojans to infiltrate a PC.
The Spy Files are, in the words of Wikileaks publisher Julian Assange, “detailing and explaining how secretive state intelligence agencies are merging with the corporate world in their bid to harvest all human electronic communication.”