The first time I ever saw this technology presented, it was in a closed door session of a Counter Intelligence briefing in a room full of very serious individuals…. “Spies”, if you really must know. After the presentation of its capabilities I remember the stunned looks of unbelief on some of the faces of those individuals….and then the lip curling smiles
that come with the knowing that what we just saw would change everything…..in the world of spying that is.
That lasted about 10 seconds, then the gauntlet was thrown down; “Our anti-virus program will nail this type of threat within minutes” …”we’ve seen this threat before, it’s been floating around for years” …were just a few of the comments from the “Cyber Wizards” in the room. Then the challenge was on!
The following examination of the “Stealth iBot Computer Spy” is only a snapshot of the forensic examination that was performed. Here is the condensed version. The Stealth iBot Computer Spy program was installed on a Lenovo laptop running Windows XP and one of the latest “name brand” anti-virus programs. Upon inserting the 1gig USB Flash Drive into the USB port of the laptop, actual installation only took about 10 seconds. The flash drive was safely removed and the Stealth iBot was now silently running in the background, embedded in the operating system. Now ready to capture every keystroke and actual screen shots, down to intervals of every 3 seconds.
An “anti-virus scan” was initiated and took roughly 45 minutes; it resulted in a green checked marked “No Threats Detected” screen of assurance. Not bad, I noticed a couple of the cyber wizard techies whispering to each other.
Next, several name brand “Spy Bot” and Spy killer programs were used to scan the Lenovo, again the “No Threats Detected” screen of assurance, one even boasted “Congratulations, no threats found!” (See pic) By this time it was obvious the Stealth iBot was going to put up a fight. But, it was now time to reinsert the flash drive and see
what the Stealth iBot captured.
The Stealth iBot flash drive was inserted into the USB port of the Laptop and the program booted up immediately. The command was initiated to download the captured information to the flash drive, and took less than 10 seconds! At this point the captured data file rests on the Stealth iBot flash drive and can be moved to another PC, but we elected to drop the captured data file folder on the Lenovo desktop to see what Stealth iBot captured. And capture it did!
There were no less than several hundred perfect screen shot images of everything that was viewed on the Laptop! including the screen shots of all the various scans of the laptop including a separate .html file that opens in your browser of every typed keystroke.
Now here I must digress to add that after the briefing had long since ended, almost everyone who attended the briefing was still present during the scans….including the “cyber wizards” who had been instructed “not to leave the room” until they figured out how to detect this threat!…. And to purchase some as soon as possible! Without a doubt, The Brickhouse Security “Stealth iBot Computer Spy Program” does everything that’s promised and more. Will it defeat any anti-virus program? The short answer is no, but then again it’s not designed to because even if an anti-virus program does manage to detect the Stealth iBot more than likely it will be granted “trusted status” because the file extension will look as though it is associated with the operating system….clever…Huh? What was that you asked?….. Was I able to detect it?? Sure, but that’s what ex-spies do…….we hunt spies.
J.D. LeaSure, Counter Surveillance Specialist is the President/CEO of ComSec LLC. He founded the Virginia Beach-based firm in 2007 filling the need for an experienced and knowledgeable Counter Espionage and Technical Surveillance Countermeasures (TSCM) service provider in the greater Virginia/DC Metro area.