Tuesday, January 14, 2025
HomeAndroidEvilBamboo Attacking Android & iOS Devices With Custom Malware

EvilBamboo Attacking Android & iOS Devices With Custom Malware

Published on

EvilBamboo, formerly known as “Evil Eye,” has been found to target Tibetan, Uyghur, and Taiwanese organizations and individuals. This threat actor was mentioned as conducting custom Android malware campaigns in September 2019.

In April 2020, EvilBamboo was discovered to be attacking iOS devices with a Safari exploit for infecting custom iOS malware to Uyghur users. However, recent reports suggest that this threat actor has been targeting Android users with fake websites and fake social media profiles that impersonate existing popular communities.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

A Tale of Three BAD Brothers

Further analysis revealed that EvilBamboo has been using at least three malware families: BADBAZAAR, BADSIGNAL, and BADSOLAR. All of this malware has a backdoor embedded inside a legitimate application.

CapabilityBADSOLARBADBAZAARBADSIGNAL
Deployed in two stagesXX
AndroRAT function namesX
Interacts with host app to exfiltrate dataX
Real-time SMS stealingX
GetOperatorName() and DeviceInfo() functionsXXX
SSL PinningX
C2 via RAW socketXX
C2 Via HTTP Rest APIX
Shared via TelegramXX
Has dedicated websiteXX
Suspected iOS variantX
Observed targetingTibetansUyghurs, Taiwanese, Tibetans & beyondUyghurs
Distinguishing malware families and capabilities (Source: Volexity)

These applications were distributed among users with supporting Telegram groups. These groups are often themed for a specific application, but at other times, they are kept around a category of applications. 

BADBAZAAR

This malware was distributed through multiple threads on a Taiwanese APK sharing forum apk[.]tw and had over 100,000 views.

The thread also claimed to be sharing a cracked, legitimate  Whoscall Android application used for identifying spam calls and messages. The post also included a link that is updated every time the app is released with a new version of the APK.

Taiwanese thread (Source: Volexity)

BADBAZAAR is capable of storing SMS on the terminal, getting call logs, taking photos, and gathering information about the device such as IMEI, timezone, Wi-Fi details, installed apps, contact lists, and location of the device.

BADSOLAR

This malware was distributed via “Tibetanphone” Telegram group, which also shared a link to ignitetibet[.]net. The request to this URL on port 9001 with jquery.min.js loads an obfuscated profiling script coined as JMASK. 

This malware is backdoored into another legitimate Android application with a C2 address as comeflxyr[.]com used for downloading a JAR file and a second-stage implant AndroRAT. Multiple method names were used in this malware, which had different functions.

FunctionDescription
AdvancedSystemInfoGet information on the terminal, such as battery details and device temperature.
CallLogListerGet the call history with the date, duration, and name associated with the caller.
ContactsListerGets contact information.
DeviceInfoGet device information, such as the MAC, operator, vendor, model, IMEI, IMSI, time zone, etc.
DirListerList the files on the device.
FileDownloaderUpload a file to the C2 server.
GetDeviceInfosGet the IMEI, SIM serial number, and phone number of the device.
GPSListenerGet the location.
PhotoTakerTake a picture.
SMSListerGet stored SMS messages.
UDPThreadCommunicate with UDP (port 137).
WifiUtilsGet the Wi-Fi details, such as the IP, SSID, BSSID, MAC, and DNS servers. The malware is also able to list the APR table by using ip neigh show.
SystemInfoExecute most of the functions listed in this table.
Different functions inside the malware (Source: Volexity)

BADSIGNAL

This is a backdoored version of the legitimate Signal app, which was distributed using the www.signalplus[.]org, www.flygram[.]org, and www.groupgram[.]org websites. This malware had two variants: the Telegram variant and the Signal variant. 

Signal One website (Source: Volexity)

On investigation further, several API endpoints configured by the threat actor revealed that they had an iOS version.

This malware does not download a second-stage payload as the main APK has all the capabilities. It was also discovered that this malware uses REST API on port 4432 as part of its C2 communication.

A complete report about this malware was published by Volexity that provides detailed information about the source code, distribution, and other information. 

Managed endpoint solutions enable organizations to scan for threats manage, resolve, and prevent data breaches. Try for Free Today!

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Google’s “Sign in with Google” Flaw Exposes Millions of Users’ Details

A critical flaw in Google's "Sign in with Google" authentication system has left millions...

Hackers Attacking Internet Connected Fortinet Firewalls Using Zero-Day Vulnerability

A widespread campaign targeting Fortinet FortiGate firewall devices with exposed management interfaces on the...

Critical macOS Vulnerability Lets Hackers to Bypass Apple’s System Integrity Protection

Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that allowed attackers to bypass...

CISA Released A Free Guide to Enhance OT Product Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Google’s “Sign in with Google” Flaw Exposes Millions of Users’ Details

A critical flaw in Google's "Sign in with Google" authentication system has left millions...

Hackers Attacking Internet Connected Fortinet Firewalls Using Zero-Day Vulnerability

A widespread campaign targeting Fortinet FortiGate firewall devices with exposed management interfaces on the...

Critical macOS Vulnerability Lets Hackers to Bypass Apple’s System Integrity Protection

Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that allowed attackers to bypass...