Researchers has discovered a new Android surveillance tool and attributed to the Law Enforcement Command of the Islamic Republic of Iran (FARAJA).
The tool dubbed as BouldSpy, the mobile malware has been used by threat actors to target minority groups and potentially those involved in illegal trafficking activities. BouldSpy has extensive surveillance capabilities, such as recording calls, capturing photos, and monitoring account usernames across various platforms.
BouldSpy keeps its application alive by turning off battery management and establishing CPU wake locks while simultaneously leveraging Android accessibility services to perform most of its surveillance actions. By abusing CPU wake locks and disabling battery management features, the spyware prevents the device from shutting down its activities, causing faster battery drainage for victims.
When installed, it establishes a network connection with its C2 server, and exfiltrates cached data from the victim’s device. A background service manages most of the surveillance functionality and restarts itself when its parent activity is stopped by either the user or the Android system.
The targeted surveillance of minority groups within Iran may lead to further discrimination and suppression, amplifying existing social and political tensions.
Only few of BouldSpy samples, all distributed outside the Google Play Store via third-party services. The spyware has not been distributed through Google Play, making it more challenging for users to identify and avoid. Moreover, this shows the danger of sideloading applications from unknown third-party sources.
This research was documented by researchers from Lookout and detailed by Zimperium
Indicators of Compromise