MiniPanzer and MegaPanzer
Appearance
Original author(s) | Ruben Unteregger |
---|---|
Initial release | 2009 |
Preview release | 0.1
/ 17 February 2016 |
Written in | C++ |
Operating system | Windows |
Platform | x86 |
Available in | English |
License | GPLv3 |
Website | sourceforge |
MiniPanzer and MegaPanzer are two variants of Bundestrojaner (German for federal Trojan horse) written for ERA IT Solutions (a Swiss federal government contractor) by software engineer Ruben Unteregger, and later used by Switzerland's Federal Department of Environment, Transport, Energy and Communications (UVEK) to intercept Skype and more generally voice over IP traffic on Windows XP systems.[1][2]
The source code of the program was released under the GNU General Public License version 3 (GPLv3) in 2009 by their author, who retained the copyright.[1] Thereafter, the trojan was apparently detected in the wild.[3] One of its designations given by anti-virus companies was Trojan.Peskyspy.[4][5]
The malware used DLL injection.[6]
References
- ^ a b Dunn, John (27 August 2009). "Swiss coder publicises government spy Trojan". TechWorld. Archived from the original on 26 January 2014. Retrieved 10 January 2021.
- ^ "MegaPanzer: Parts of Possible Govware Trojan Re..." Linux Magazine. 2009-08-28. Retrieved 2014-01-26.
- ^ Zetter, Kim (2009-08-31). "Code for Skype Spyware Released to Thwart Surveillance | Threat Level". Wired. Retrieved 2014-01-26.
- ^ "Trojan.Peskyspy—Listening in on your Conversations". symantec.com. Symantec. 27 Aug 2009. Retrieved August 30, 2016.
- ^ Danchev, Dancho (2009-08-28). "Source code for Skype eavesdropping trojan in the wild". ZDNet. Retrieved 2014-01-26.
- ^ Ziemann, Frank (2009-08-28). "Schweizer Bundestrojaner als Open Source". PC-WELT (in German). Retrieved 2022-02-27.
Further reading
- Bundestrojaner: A programmer speaks out[dead link] Interview with the author on gulli.com
External links
- MiniPanzer SourceForge, source code
- MegaPanzer SourceForge source code