Tuesday, April 15, 2025
HomeAndroidFinSpy Malware Attacking iOS and Android Devices to Steal Personal Information

FinSpy Malware Attacking iOS and Android Devices to Steal Personal Information

Published on

SIEM as a Service

Follow Us on Google News

A powerful surveillance malware dubbed FinSpy spies on various mobile platforms that includes iOS, Android devices, and desktop platforms. The FinSpy malware also known as FinFisher.

Security researchers from Kaspersky spotted a new campaign in June 2019, targeting mobile device users in Myanmar. The Finspy malware developed by German company Gamma Group and it sells the malware to government and law enforcement organizations around the world.

The malware is capable of stealing sensitive information such as contacts, SMS/MMS messages, emails, calendars, GPS location, photos, files in memory, phone call recordings and data from the most popular messengers such as Whatsapp and Telegram.

- Advertisement - Google News

FinSpy has proven very successful in operations around the world for several years, and it helps government and law enforcement organizations valuable intelligence has been agencies to gather informations about Target Individuals and Organizations.

FinSpy for iOS

It records all device activities that includes VoIP calls, Skype or WhatsApp, signal, Telegram, and other messengers. It can be installed on the jailbroken devices, once installed it unlimited monitoring access to the device.

The malware can be installed by an attacker to the phone if they have physical access, and remotely through SMS messages, emails and WAP Push.

The malware contains following data collection modules

.hdutils – Targets incoming SMS messages.
.chext – Targets messenger applications to exfiltrate informations.
keys – Handles keylogging activity.
.vpext – Records VoIP calls.

FinFisher for Android

The Android version has similar functionality like iOS, in addition to that, it is capable of gaining root access by exploiting the DirtyCow privilege escalation vulnerability.

As like iOS variant it can de installed physically and remotely, once installed it employees DirtyCow vulnerability to elevate privileges and gains root access.

“The implant provides access to information such as contacts, SMS/MMS messages, calendars, GPS location, pictures, files in memory and phone call recordings. All the exfiltrated data is transferred to the attacker via SMS messages or via the internet,” reads the report.

Kaspersky researchers detected the implants in more than 20 countries, and the “FinSpy developers are constantly working on the updates for their malware. At the time of publication, Kaspersky researchers have found another version of the threat and are currently investigating this case.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read

25 Million Android Users Infected with Powerful “Agent Smith” Malware Through Exploiting Several Mobile Vulnerabilities

More than 1,300 Android Apps Steals user Data Even After the Permission Denied

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...