Site icon TheCyberThrone

Spyware targeting Italy and Kazakhstan

Advertisements

Google has came up with details about a spyware vendor called RCS Labs that has been caught targeting people in Italy and Kazakhstan.

TAG says that RCS Labs targeted iOS and Android devices alike with its spyware. All campaigns TAG observed originated with a unique link sent to the target, Once clicked, the page attempted to get the user to download and install a malicious application on either Android or iOS.

Advertisements

Those malicious links appear to have arrived in two different flavors. One masqueraded as an app that could be used to restore the victim’s mobile data connection more on that in a moment while the other pretended to be some kind of messaging app.

The former only works if someone has actually lost internet access on their phone, of course, and it seems RCS Labs had some assistance in that regard. It is believe the actors worked with the target’s ISP to disable the target’s mobile data connectivity.

The attacks then progressed based on what kind of smartphone a target uses. On iPhone, the spyware exploited six different vulnerabilities, two of which TAG says were zero-days.

Advertisements

RCS Labs took a different approach on Android. TAG says the malicious app, which was designed to look like a legitimate Samsung app, does not contain any exploits. Instead the group believes RCS Labs used command-and-control infrastructure to remotely download and execute exploits.

TAG says that RCS Labs used features built into iOS and Android that allow users to sideload software, which means the applications weren’t subject to the same scrutiny as officially distributed software.

Indicators of Compromise

Drive-by download domains

Advertisements

C2 domains

C2 IPs

Exit mobile version