MiniPanzer and MegaPanzer

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Colin Douglas Howell (talk | contribs) at 15:20, 21 June 2020 (Make it a little clearer that this software was used by Switzerland rather than by Germany. (On a first read, my attention was drawn to the German-language name and terminology using "Bundes-" to mean "federal", and I found my mind automatically locked on "Germany" while failing to notice the "Swiss contractor" bit.)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

MiniPanzer and MegaPanzer
Original author(s)Ruben Unteregger
Initial release2009; 15 years ago (2009)
Preview release
0.1 / 17 February 2016; 8 years ago (2016-02-17)
Written inC++
Operating systemWindows
Platformx86
Available inEnglish
LicenseGPLv3
Websitesourceforge.net/projects/mini-panzer

MiniPanzer and MegaPanzer are two variants of Bundestrojaner (German for federal Trojan horse) written for ERA IT Solutions (a Swiss federal government contractor) by software engineer Ruben Unteregger, and later used by Switzerland's Federal Department of Environment, Transport, Energy and Communications (UVEK) to intercept Skype and more generally voice over IP traffic on Windows XP systems.[1][2]

The source code of the program was released under the GNU General Public License version 3 (GPLv3) in 2009 by their author, who retained the copyright.[1] Thereafter, the trojan was apparently detected in the wild.[3] One of its designations given by anti-virus companies was Trojan.Peskyspy.[4][5]

References

  1. ^ a b "Swiss coder publicises government spy Trojan - Techworld.com". News.techworld.com. Retrieved 2014-01-26.
  2. ^ "MegaPanzer: Parts of Possible Govware Trojan Re..." Linux Magazine. 2009-08-28. Retrieved 2014-01-26.
  3. ^ Zetter, Kim (2009-08-31). "Code for Skype Spyware Released to Thwart Surveillance | Threat Level". Wired. Wired.com. Retrieved 2014-01-26.
  4. ^ "Trojan.Peskyspy—Listening in on your Conversations". symantec.com. Symantec. 27 Aug 2009. Retrieved August 30, 2016.
  5. ^ Danchev, Dancho (2009-08-28). "Source code for Skype eavesdropping trojan in the wild". ZDNet. Retrieved 2014-01-26.

Further reading

External links