DarkMatter Group

DarkMatter Group is a computer security company[1][2] founded in the United Arab Emirates (UAE) in 2014[3][4] or 2015.[5] The company describes itself as a purely defensive company.

DarkMatter Group
TypePrivate
Industrycybersecurity
Founded2014 (2014)
HeadquartersAbu Dhabi, United Arab Emirates
Area served
UAE, Finland, Canada
Key people
Websitewww.darkmatter.ae

Company history

DarkMatter was founded in either 2014[3][4] or 2015[5] by Faisal al-Bannai, the founder of mobile phone vendor Axiom Telecom and the son of a major general in the Dubai Police Force.[5][3][2] Around 2014, Zeline 1, a wholly owned subsidiary of DarkMatter, became active in Finland.[4]

DarkMatter's public launch came in 2015, at the 2nd Annual Arab Future Cities Summit.[1] At this time, the company advertised capabilities including network security and bug sweeping, and promised to create a new, "secure" mobile phone handset.[1] It promoted itself as a "digital defense and intelligence service" for the UAE.[1]

In 2016, DarkMatter replaced CyberPoint as a contractor for Project Raven.[3][lower-alpha 1][lower-alpha 2] Also in 2016, DarkMatter sought smartphone development expertise in Oulu, Finland.[4] DarkMatter recruited several Finnish engineers.[4]

By early 2018, DarkMatter's turnover was hundreds of millions of U.S. dollars.[2] Eighty percent of its work was for the UAE government and related organizations, including the NESA.[2] It had developed a smartphone model called Katim, Arabic for "silence".[4][5] DarkMatter was an official provider for the Expo 2020,[13] but has since been dropped in favour of a different company.

In 2021, DarkMatter's cyber activities have already been transferred to Digital14 which now distributes the secure communications system 'Katim'.[14]

Recruitment practices

In addition to recruiting via conventional routes such as personal referrals and stalls at trade shows (e.g. Black Hat),[1] DarkMatter headhunts staff from the U.S. National Security Agency and has "poached" competitors' staff after they were contracted to the UAE government, as happened with some CyberPoint employees.[1][2]

The company has reportedly hired graduates of the Israel Defense Force technology units and is paying them up to $1 million annually.[15]

Simone Maragitelli, an Italian security researcher, blogged about DarkMatter's vague and dubious recruiting practices as a warning to others. He claimed that any questions or objections to the company's practices would result in being told that "things had been blown out of proportion" and that information about the job opening was extremely vague despite asking questions.[16][17]

Allegations of surveillance for UAE government

In response to alleged cyber spying on opponents of Iran's best interests by the government of Iran during 2010 and 2011, the United States assisted the United Arab Emirates in late 2011 with establishing the National Electronic Security Authority (NESA) which is the UAE's equivalent to the US NSA.[18]

Project Raven

Project Raven was a confidential initiative to help the UAE surveil other governments, militants, and human rights activists.[3] Its team included former U.S. intelligence agents, who applied their training to hack phones and computers belonging to Project Raven's victims.[3] The operation was based in a converted mansion in a suburb of Abu Dhabi in Khalifa City nicknamed "the Villa."[3]

From around 2014 to 2016, CyberPoint supplied U.S.-trained contractors to Project Raven. In 2016, news reports emerged that CyberPoint had contracted with the Italian spyware company Hacking Team, which damaged CyberPoint's reputation as a defensive cybersecurity firm.[1] Reportedly dissatisfied with relying upon a U.S.-based contractor, the UAE replaced CyberPoint with DarkMatter as its contractor, and DarkMatter induced several CyberPoint staff to move to DarkMatter.[3][19] After this, Project Raven reportedly expanded its surveillance to include the targeting of Americans, potentially implicating its American staff in unlawful behaviour.[3][19][20]

Following a 24 October 2016 The Intercept article revealing DarkMatter surveillance for UAE, Samer Khalife, the chief financial officer for DarkMatter, transferred some United States citizens from DarkMatter to a new company Connection Systems and tiger teams were established by DarkMatter to counter the allegations contained in The Intercept article.[21]

On 1 February 2019, Ars Technica published comments from DarkMatter's former employee, Daniel Wolford. He stated, "We did not hack Americans...Our mission was simple: advise and assist UAE to create a national cyber security program similar to NTOC (NSA/CSS Threat Operations Center)." The work done creating a "target list," Wolford said, was part of a training operation "to teach the Emiratis about lawful targeting and collection," he asserted. "We tried to show them who is and isn't a threat to their national security."[22]

On 9 December 2021, Loujain al-Hathloul filed a lawsuit in a US district court in Oregon against three former US intelligence and military officers, who carried out hacking operations on behalf of the UAE. According to the lawsuit, the three men — Marc Baier, Ryan Adams, and Daniel Gericke — worked for DarkMatter and assisted the Emirati security officials to exfiltrate data from her iPhone. The hacking had led to al-Hathloul's arrest from the UAE and rendition to Saudi Arabia, where she was detained, imprisoned and tortured.[23]

On 22 December 2021, A very popular messaging app named "ToTok" was deemed to be a secret spy tool developed by the UAE. Very little is known about the tool and what its capabilities are.[24]

In December 2021, U.S. lawmakers urged the Treasury and State Departments to sanction DarkMatter, NSO Group, Nexa Technologies, and Trovicor. The letter signed by the Senate Finance Committee Chairman Ron Wyden, House Intelligence Committee Chairman Adam Schiff, and 16 other lawmakers, asked for Global Magnitsky sanctions, as the companies were accused of enabling human rights abuses. The letter demanded that High-ranking executives at DarkMatter, along with the three other firms, be sanctioned.[25]

On 26 August 2022, the three former U.S. intelligence operatives who helped the UAE spy on human rights activists, journalists, and governments were barred from arms export activities under a deal announced by the State Department. The operatives, Marc Baier, Ryan Adams, and Daniel Gericke, were prohibited for three years from participating directly or indirectly in any activities subject to the International Traffic in Arms Regulations (ITAR).[26]

Karma spyware

In 2016, Project Raven bought a tool called Karma.[27] Karma was able to remotely exploit Apple iPhones anywhere in the world, without requiring any interaction on the part of the iPhone's owner as long as an username was provided, such as Apple ID, Email address associated with the phone, or phone number.[3] It apparently achieved this by exploiting a zero-day vulnerability in the device's iMessage app.[3] Project Raven operatives were able to view passwords, emails, text messages, photos and location data from the compromised iPhones.[27][3]

People whose mobile phones have been deliberately compromised using Karma reportedly include:

  • The Emir of Qatar, Sheikh Tamim bin Hamad Al Thani nicknamed "Crybaby", Hamad bin Khalifa Al Thani nicknamed "AngryFather", plus his brother and several other close associates.[1]
  • Nadia Mansoor, wife of imprisoned UAE human rights activist Ahmed Mansoor.[3] (Nadia was nicknamed "Purple Egret" by Project Raven; Ahmed was nicknamed "Egret".)[1]
  • British journalist Rori Donaghy.[3] (Donaghy was nicknamed "Gyro" by Project Raven.)[1]
  • Prime Minister of Lebanon Saad Hariri (UAE associated him with supporting Hezbollah.) [28]
  • Hundreds of other targets in Europe and the Middle East, including the governments of Qatar, Yemen, Kuwait, Oman, Serbia, Lebanon, Iran and Turkey.[1]

Around mid-2017, Apple patched some of the security vulnerabilities exploited by Karma, unknowingly reducing the tool's effectiveness.[27]

Certificate authority controversy

In 2016, two DarkMatter whistleblowers and multiple other security researchers expressed concerns that DarkMatter intended to become a certificate authority (CA).[1] This would give it the technical capability to create fraudulent certificates, which would allow fraudulent websites or software updates to convincingly masquerade as legitimate ones.[1] Such capabilities, if misused, would allow DarkMatter to more easily deploy rootkits to targets' devices, and to decrypt HTTPS communications of Firefox users via man-in-the-middle attacks.[1][29][30]

On 28 December 2017, DarkMatter requested that Mozilla include it as a trusted CA in the Firefox web browser.[31] For more than a year, Mozilla's reviewers addressed concerns about DarkMatter's technical practices, eventually questioning on that basis whether DarkMatter met the baseline requirements for inclusion.[31][32]

On 30 January 2019, Reuters published investigations describing DarkMatter's Project Raven.[3][29] Mozilla's reviewers noted the investigation's findings.[32] Subsequently, the Electronic Frontier Foundation (EFF) and others asked Mozilla to deny DarkMatter's request, on the basis that the investigation showed DarkMatter to be untrustworthy and therefore liable to misuse its capabilities.[29][30][32][31] As of March 2019, Mozilla's public consultation and deliberations are ongoing.[32][31]

In July 2019, Mozilla prohibited the government of the United Arab Emirates from operating as one of its internet security gatekeepers, following reports on the cyber-espionage program, which was run by Abu Dhabi-based DarkMatter staff for leading a clandestine hacking operation.[33]

In August 2019, Google blocked websites approved by DarkMatter, after Reuters reported the firm's involvement in a hacking operation led by the United Arab Emirates. Google, previously, said that all websites certified by DarkMatter would be marked as unsafe by its Chrome and Android browsers.[34]

FBI investigation and indictments

DarkMatter is under investigation by the FBI for crimes including digital espionage services, involvement in the Jamal Khashoggi assassination, and incarceration of foreign dissidents.[35]

On September 14, 2021, Marc Baier 49, Ryan Adams 34, and Daniel Gericke 40, who had been indicted for violations of United States laws involving computer fraud and improper exporting of technology, agreed to a deferred prosecution agreement in which they would pay a fine over three years of $750,000, $600,000, and $335,000, respectively, for a total of $1.68 million, support FBI and Justice Department investigations, sever ties to any United Arab Emirates intelligence and law enforcement agencies, be under a prohibition of services, including defense articles, associated with ITAR and future computer network exploitation employment, and immediately both relinquish their security clearances from the United States and any foreign entity and be under a lifetime ban on future security clearances from the United States. After the UAE contracts shifted from the US parent firm CyberPoint to its UAE subsidiary DarkMatter, Baier, who was a former employee of the NSA, and Adams and Gericke, who had been in the United States military and intelligence community, failed to receive permission to be employed by the UAE firm. According to Lori Stroud who is a former NSA employee, the trio had worked for the United States-based CyberPoint and then for its UAE subsidiary DarkMatter which in 2018 Faisal al-Bannai confirmed that DarkMatter works very closely with the government of the UAE and is a competitor of the Israeli firm NSO Group. From January 2016 to November 2019, the trio of Marc Baier, Ryan Adams, and Daniel Gericke significantly improved the operations that DarkMatter provided to the government of the UAE. DarkMatter was very interested in hacking into Qatar's computers and obtaining and reading its electronic messages, as it was believed that Qatar was supporting a potential terrorist organization named the Muslim Brotherhood.[36] For example, DarkMatter had hacked into an electronic communication between First Lady Michelle Obama and a former Qatari minister regarding Michelle Obama and Conan O'Brien's November 2015 trip to Qatar where both Obama and O'Brien visited the al-Udeid airbase which hosts the forward base headquarters of United States Central Command, the RAF's No. 83 Expeditionary Air Group, and the headquarters of the United States Air Forces Central Command during the Wars in Iraq and Afghanistan.[37][38][39][40][41][42][43][44][45][46]

New United States law

In January 2020 during the FBI investigations into DarkMatter employees' conduct, the United States Congress passed a law proposed in 2019 by congressperson Max Rose of New York. The law requires the United States intelligence agencies to annually assess the risk to the United States national security posed by former intelligence officials and employees who are working for foreign-based firms, governments, and entities.[47][48] This law was driven in part by the United Arab Emirates cyber espionage operations against United States citizens, firms, entities, and government.[47]

See also

Notes

  1. CyberPoint Inc. occupied suite 7967, which was a virtual office space with nineteen other companies, in the World Trade Center North Tower (also called 1 Tower or the old One World Trade Center) through the firm Alliance Business Centers / International Office Centers Corporation which was established in 1992 by its CEO Frank Cottle.[6][7][8][9][10][11]
  2. From 1968 to 1969, Frank Cottle studied English as an undergraduate at Principia and from 1970 to 1973 attended United States International University in San Diego receiving a Bachelor's degree in English. From January 1973 to December 1983, he worked at Ardell Yacht and Ship Brokers in International Sales and from December 1998 to June 2000 he was at Deloitte Consulting in the Director of Procurement, USA department.[12]

References

  1. McLaughlin, Jenna (24 October 2016). "Featured News: Spies for Hire". The Intercept. Archived from the original on 12 June 2019.
  2. "Emerging Gulf State cyber security powerhouse growing rapidly in..." reuters.com. 2 February 2018.
  3. "Exclusive: Ex-NSA cyberspies reveal how they helped hack foes of UAE". Reuters.
  4. "Revealed: Secretive UAE cybersecurity firm with a history of spying on dissidents is operating in Finland". helsinkitimes.fi. 3 February 2019.
  5. "UAE cyber firm DarkMatter slowly steps out of the shadows". phys.org.
  6. Stock, Gary (September 21, 2001). "WTC Companies with phone numbers in the World Trade Center Towers". Gary Stock website. Archived from the original on September 15, 2021. Retrieved September 15, 2021 via Southwestern Bell SMARTpages.
  7. "Alliance Business Centers Network: Corporate Identity Program". Alliance Business Centers Network website (abcn.com). August 13, 2001. Archived from the original on August 13, 2001. Retrieved September 15, 2021.
  8. "Alliance Business Centers: ABOUT ALLIANCE Who We Are and What We Do". Alliance Business Centers website (abcn.com). September 15, 2021. Archived from the original on September 15, 2021. Retrieved September 15, 2021.
  9. Saunders, Mike (December 2016). "Frank Cottle – Chairman, Founder at Alliance Business Centers". Influential Entrepreneurs (businessinnovatorsradio.com). Archived from the original on September 15, 2021. Retrieved September 15, 2021.
  10. "Alliance Virtual Offices: About Management and Staff, Frank Cottle". Alliance Virtual Offices website (alliancevirtualoffices.com). September 15, 2021. Archived from the original on September 15, 2021. Retrieved September 15, 2021.
  11. "Alliance Business Centers Network: ALLIANCE NETWORK - New York". Alliance Business Centers Network website (abcn.com). December 25, 2001. Archived from the original on December 25, 2001. Retrieved September 15, 2021.
  12. Cottle, Frank (September 15, 2021). "Frank Cottle bio". Retrieved September 15, 2021.
  13. "Who's going to protect you online at Expo 2020?". Official Expo 2020 news blog. June 4, 2018. Retrieved August 20, 2020.
  14. "Digital14 picks up Darkmatter's key activities, including the vulnerabilities researcher xen1thLabs". 21 January 2021. Retrieved September 15, 2021.
  15. Ziv, Amitai [in Hebrew] (16 October 2019). "Mysterious UAE Cyber Firm Luring ex-Israeli Intel Officers With Astronomical Salaries". Haaretz.
  16. Maragitelli, Simone (July 27, 2016). "How The United Arab Emirates Intelligence Tried to Hire me to Spy on its People". Archived from the original on 2016-07-27. Retrieved September 15, 2021.
  17. McLaughlin, Jenna (2016-10-24). "Featured News: Spies for Hire". The Intercept. Retrieved 2020-03-03.
  18. McLaughlin, Jenna (December 21, 2017). "Deep Pockets, Deep Cover: The UAE Is paying Ex-CIA officers to build a spy empire in the Gulf". Foreign Policy. Archived from the original on September 19, 2021. Retrieved September 18, 2021.
  19. "A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments". The New York Times. 2019-03-21. Retrieved 2019-03-22.
  20. "Takeaways From The Times's Investigation Into Hackers for Hire". The New York Times. 2019-03-21. Retrieved 2019-03-22.
  21. Biddle, Sam; Cole, Matthew (June 12, 2019). "Team of American Hackers and Emirati Spies Discussed Attacking The Intercept". The Intercept. Archived from the original on June 12, 2019. Retrieved September 18, 2021.
  22. Gallagher, Sean (February 1, 2019). "UAE buys its way toward supremacy in Gulf cyberwar, using US and Israeli experts".
  23. "Saudi women's rights activist sues three ex-US intel operatives over hacking for UAE". The Guardian. 9 December 2021. Retrieved 9 December 2021.
  24. Mazzetti, Mark; Perlroth, Nicole; Bergman, Ronen (22 December 2019). "It Seemed Like a Popular Chat App. It's Secretly a Spy Tool". The New York Times.
  25. Menn, Joseph; Schectman, Joel (15 December 2021). "U.S. lawmakers call for sanctions against Israel's NSO, other spyware firms". Reuters. Retrieved 15 December 2021.
  26. "Ex-U.S. intel operatives who worked for UAE barred from arms exports, State Dept says". Reuters. 26 August 2022. Retrieved 26 August 2022.
  27. Reuters staff. "A top secret UAE spy operation staffed by former NSA cyber-agents hacked into the iPhones of dissidents and rivals". Business Insider. {{cite web}}: |last= has generic name (help)
  28. Craig Timberg; Michael Birnbaum; Drew Harwell; Dan Sabbagh (2021-07-20). "On the list: Ten prime ministers, three presidents and a king". The Washington Post. Washington, D.C. ISSN 0190-8286. OCLC 1330888409.
  29. "CyberSecurity Firm Darkmatter Request to be Trusted Root CA Raises Concerns". BleepingComputer.
  30. Quintin, Cooper (22 February 2019). "Cyber-Mercenary Groups Shouldn't be Trusted in Your Browser or Anywhere Else". Electronic Frontier Foundation.
  31. "1427262 - Add DarkMatter Root Certificates". bugzilla.mozilla.org.
  32. "DarkMatter Concerns". Google Groups.
  33. "Mozilla blocks UAE bid to become an internet security guardian after hacking reports". Reuters. Retrieved 9 June 2019.
  34. "Google blocks websites certified by DarkMatter, after Reuters reports". Reuters. Retrieved 1 August 2019.
  35. "Information War Led to Khashoggi's Murder | RealClearPolitics". www.realclearpolitics.com. Retrieved 2020-03-03.
  36. "Will Qatar's Relationship with the Muslim Brotherhood Change after Gulf Reconciliation?".
  37. "3 former U.S. officials charged in United Arab Emirates hacking scheme". Associated Press. September 14, 2021. Archived from the original on September 15, 2021. Retrieved September 15, 2021 via Honolulu Star-Advertiser.
  38. Schectman, Joel; Bing, Christopher (September 15, 2021). "Ex-U.S. intel operatives admit hacking American networks for UAE". Reuters. Retrieved September 15, 2021.
  39. Bing, Christopher; Schectman, Joel (January 30, 2019). "Project Raven: Inside the UAE's secret hacking team of American mercenaries. Ex-NSA operatives reveal how they helped spy on targets for the Arab monarchy — dissidents, rival leaders and journalists". Reuters. Retrieved September 15, 2021.
  40. Cimpanau, Catalin (September 14, 2021). "US fines former NSA employees who provided hacker-for-hire services to UAE". TheRecord.media. Retrieved September 15, 2021.
  41. "3 former U.S. intelligence operatives to pay over $1.6 million to resolve mercenary hacking charges: The men worked for the United Arab Emirates and faced federal charges of conspiring to violate hacking laws, the Justice Department said Tuesday". NBC News. September 14, 2021. Retrieved September 15, 2021.
  42. Hsu, Spencer (September 15, 2021). "Three former U.S. intelligence operatives admit to working as 'hackers-for-hire' for UAE". The Washington Post. Retrieved September 15, 2021.
  43. "הסדר טיעון עם שלושה אנשי ביון לשעבר מגלה: איחוד האמירויות הפעיל פצחנים בארה"ב" [A plea deal with three former spies reveals: The UAE has activated crackers in the US]. news1.co.il (in Hebrew). September 15, 2021. Archived from the original on September 16, 2021. Retrieved September 15, 2021.
  44. "First Lady Michelle Obama to Travel to the State of Qatar and the Hashemite Kingdom of Jordan". FLOTUS: The White House. October 28, 2015. Retrieved September 15, 2021.
  45. Weinberg, David Andrew (November 3, 2015). "Michelle's Dangerous Journey to Qatar: The First Lady preaches tolerance where only last week a sheik declared of Jews: 'Kill them completely.'". Politico. Retrieved September 15, 2021.
  46. AP staff (November 2, 2015). "US first lady Michelle Obama arrives in Qatar for speech". Associated Press. Retrieved September 15, 2021 via Seattle Times.
  47. Schectman, Joel; Bing, Christopher (January 22, 2020). "New U.S. law requires government to report risks of overseas activities by ex-spies". Reuters. Archived from the original on April 15, 2021. Retrieved September 18, 2021.
  48. Riley, Tonya (September 14, 2021). "Former US intelligence operatives charged with helping UAE hack rivals, Americans". cyberscoop.com. Archived from the original on September 17, 2021. Retrieved September 14, 2021.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.