Google says attackers worked with ISPs to deploy Hermit spyware on Android and iOS

Date:

Share:

[ad_1]

A sophisticated spyware campaign is getting the help of internet service providers (ISPs) to trick users into downloading malicious apps, according to research published by Google’s Threat Analysis Group (TAG) (via TechCrunch). This corroborates earlier findings from security research group Lookout, which has linked the spyware, dubbed Hermit, to Italian spyware vendor RCS Labs.

Lookout says RCS Labs is in the same line of work as NSO Group — the infamous surveillance-for-hire company behind the Pegasus spyware — and peddles commercial spyware to various government agencies. Researchers at Lookout believe Hermit has already been deployed by the government of Kazakhstan and Italian authorities. In line with these findings, Google has identified victims in both countries and says it will notify affected users.

As described in Lookout’s report, Hermit is a modular threat that can download additional capabilities from a command and control (C2) server. This allows the spyware to access the call records, location, photos, and text messages on a victim’s device. Hermit’s also able to record audio, make and intercept phone calls, as well as root to an Android device, which gives it full control over its core operating system.

The spyware can infect both Android and iPhones by disguising itself as a legitimate source, typically taking on the form of a mobile carrier or messaging app. Google’s cybersecurity researchers found that some attackers actually worked with ISPs to switch off a victim’s mobile data to further their scheme. Bad actors would then pose as a victim’s mobile carrier over SMS and trick users into believing that a malicious app download will restore their internet connectivity. If attackers were unable to work with an ISP, Google says they posed as seemingly authentic messaging apps that they deceived users into downloading.

Researchers from Lookout and TAG say apps containing Hermit were never made available via the Google Play or Apple App Store. However, attackers were able to distribute infected apps on iOS by enrolling in Apple’s Developer Enterprise Program. This allowed bad actors to bypass the App Store’s standard vetting process and obtain a certificate that “satisfies all of the iOS code signing requirements on any iOS devices.”

Apple told The Verge that it has since revoked any accounts or certificates associated with the threat. In addition to notifying affected users, Google has also pushed a Google Play Protect update to all users.

[ad_2]

Source link

Subscribe to our magazine

━ more like this

U.S. Treasury removes Francisco Javier D’Agostino from sanctions list after independent review

The United States Treasury Department has removed Francisco Javier D'Agostino from its sanctions list following an independent review that confirmed his business activities were...

Expert Forensic Analysis in Investigating Crypto Investment Scams and Recovering Lost Funds

The allure of cryptocurrency investment, with its potential for high returns, has unfortunately attracted a darker side: sophisticated and deceptive scams. Victims of these...

Asia’s Certified Cryptocurrency Investigator Launches in Singapore: Pioneering Crypto Crime Investigation (C.C.I)

Singapore, – In a groundbreaking move to enhance digital asset security and bolster consumer confidence in the cryptocurrency market, the Crypto Crime  Investigation...

C.C.I Launches as the Ultimate Recovery Platform for Crypto Investors Targeted by Scams

Nevada, Florida – In response to the growing concern over cryptocurrency investment scams, C.C.I (Crypto Crime Investigation) proudly announces its official launch as the...

Here’s what we know about the suspect in the latest Trump assassination attempt

Local authorities said the U.S. Secret Service agents protecting Trump fired at a man pointing an AK-style rifle with a scope as Trump...