Ethiopian authorities have carried out a renewed campaign of malware attacks, abusing commercial spyware to monitor government critics abroad, Human Rights Watch said today. The government should immediately cease digital attacks on activists and independent voices, while spyware companies should be far more closely regulated.On December 6, 2017, independent researchers at the Toronto-based research center Citizen Lab published a technical analysis showing the renewed government malware campaign aimed at Ethiopian activists and political opponents. These attacks follow a long, documented history of similar government efforts to monitor critics, inside and outside of Ethiopia.
“The Ethiopian government has doubled down on its efforts to spy on its critics, no matter where they are in the world,” said Cynthia Wong, senior internet researcher at Human Rights Watch. “These attacks threaten freedom of expression and the privacy and the digital security of the people targeted.”
Based on analysis of attacks starting in 2016, the Citizen Lab report identified several targets who received phishing emails, including several ethnic Oromo activists and scholars, one of Citizen Lab’s own research fellows, and Jawar Mohammed, an Oromo activist and executive director of the US-based Oromia Media Network (OMN). During the period of the infections described in the report, there were widespread protests in Ethiopia, beginning with Oromo protests over development plans around the capital, Addis Ababa, which culminated in a 10-month state of emergency that was lifted in August 2017. Security forces responded to those largely peaceful protests with lethal force, killing over one thousand protesters and detaining tens of thousands more since November 2015.
The government has gone to various lengths to restrict OMN – an independent media network that covers current events in Oromia, Ethiopia – and other diaspora media outlets. Given Ethiopia’s stranglehold on independent media and access to information, diaspora media outlets provide an important source of information that is independent from government, albeit often heavily politicized.
OMN played a key role in disseminating information during protests in 2015 and 2016. The government has routinely jammed satellite television programs, arrested informants, pressured satellite companies to drop OMN, arrested people who show OMN in their places of businesses, and charged OMN under the antiterrorism law in October 2016.
Identified targets in the most recent round of malware attacks were commentators on Ethiopian affairs, who received emails that were tailored to their interests. The emails invited the targets to download and install a software update, which contained malware, to view the content. The phishing attacks, if successful, would have infected their personal computers with spyware. The Citizen Lab report also uncovered dozens of successfully infected devices belonging to other targets in 20 countries, including in the US, UK, Eritrea, Canada, and Germany.
Citizen Lab’s analysis of the attacks and logfiles places the operator inside Ethiopia and links the software to Cyberbit, an Israel-based cybersecurity company. The company is a wholly owned subsidiary of Elbit Systems, an Israel-based defense company. The analysis suggests that the spyware in use is Cyberbit’s PC Surveillance System (PSS), which the company may have recently rebranded as PC 360.
Cyberbit’s marketing materials describes PSS as a “comprehensive solution for monitoring and extracting information from remote [personal computers].” Once a computer is infected, the spyware’s operator would gain access to virtually any information available on the device, including files, browsing history, passwords, emails, and what the target types into the computer. The spyware can also take screen shots and activate a computer’s microphone and camera for live surveillance. The marketing materials indicate that PSS was created for law enforcement and intelligence agencies to “reduce crime” and “prevent terrorism.”
Citizen Lab’s report also identifies potential Cyberbit product demonstrations to possible clients in several other countries, including Kazakhstan, Nigeria, the Philippines, Rwanda, Serbia, Thailand, Uzbekistan, Vietnam, and Zambia.
This is the third known spyware vendor that the Ethiopian government has engaged since 2013. Human Rights Watch and Citizen Labpreviously wrote about the government’s use of malware sold by UK/Germany-based Gamma International (reorganized as FinFisher) and Italy-based Hacking Team to target journalists and activists in the Ethiopian diaspora. Authorities continued to misuseHacking Team’s product through at least 2015, when a widely covered breach of the company’s corporate data confirmed its business in the country.
The government also has a history of abusing other surveillance technologies, which has facilitated a range of human rights violations. Inside the country, Ethiopian authorities have frequently used mobile surveillance to target independent voices. Human Rights Watch has documented how security agencies would play intercepted phone calls during abusive interrogations in an effort to intimidate critics and political opponents into silence.
Spyware companies often market their products to government agencies tasked with fighting crime or preventing terrorism. However, the Ethiopian government has a documented history of abusing its counterterrorism laws to target journalists, bloggers, protesters, and government critics. At least 85 journalists have fled into exile since 2010 as a result of the government’s ongoing crackdown on independent media. Ethiopia’s laws lack meaningful protections for the right to privacy, and the country’s broad security and law enforcement powers are not adequately regulated to prevent arbitrary, unlawful, or disproportionate surveillance.
Human Rights Watch wrote to Cyberbit to request comment on Citizen Lab’s findings, the company’s approach to assessing the human rights impact of spyware sales to government customers, and what steps the company would take if it uncovered government abuses linked to their product. In a December 5 response, the company stated that it is “a vendor and it does not operate any of its products. Cyberbit Solutions customers are the sole operators of the products at their sole responsibility and they are obliged to do so according to all applicable laws and regulations” in their jurisdictions.
The company also stated that it offers its products only to government authorities, and any sales of “lawful interception and intelligence products are subject to export control due to their nature and they were sold only after obtaining all relevant authorizations,” including specific approval of a designated government end user.
Finally, the company stated that while it cannot confirm or deny any specific transaction or client, the company appreciates the concerns raised and is “addressing it subject to the legal and contractual confidentiality obligations Cyberbit Solutions is bound by.”
Cyberbit should immediately investigate misuse of its products by Ethiopian authorities, publicly disclose its findings, and end any plans for future sales and any ongoing support it may be providing, Human Rights Watch said.
Despite some progress in recent years, the sale of commercial spyware remains poorly regulated at the national and international level, as Ethiopia’s repeated purchase of such tools demonstrates. Since 2014, the European Union and 41 member countries to the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies have begun to introduce regulations to control the sale of systems like those sold by Cyberbit. However, even where they exist, national implementation of such export controls has been uneven. Some governments do not adequately consider the risk to human rights when evaluating a company’s application to export spyware to repressive regimes.
While Israel does not formally participate in the Wassenaar Arrangement, it nonetheless incorporates the Wassenaar control lists into its national regulations. Exports of spyware systems from Israel’s thriving cybersecurity industry to foreign governments for security purposes require approval from Israel’s Defense Export Control Agency. Though the agency consults with the Israeli Ministry of Foreign Affairs, it is unclear whether the government requires an examination of the end-user’s or destination country’s human rights record and whether the sale might facilitate violations of rights.
According to 2016 media reports, the agency had previously approved the sale of similar spyware by the Israeli technology company NSO Group to the United Arab Emirates (UAE), despite its record of surveillance abuses. The UAE later used this technology to target a prominent human rights activist, Ahmed Mansoor. In October, the export agency announced that it will loosen some export restrictions, though how the changes will apply to spyware systems remains unclear.
The latest Ethiopian malware campaign raises significant questions about whether Israel’s export controls are adequate to prevent human rights abuses linked to spyware sales, Human Rights Watch said. Israel and other governments should ensure that such sales are reviewed on a case-by-case basis, and evaluate the end-use and human rights record of the end user.
“It is troubling if Israeli authorities allowed the sale of Cyberbit’s spyware to Ethiopian security agencies, given their established record of using malware to violate rights,” Wong said. “Spyware should be kept far from known human rights abusers.”
Human Rights Watch