Saturday, May 18, 2024

FinSpy Malware Attacking iOS and Android Devices to Steal Personal Information

A powerful surveillance malware dubbed FinSpy spies on various mobile platforms that includes iOS, Android devices, and desktop platforms. The FinSpy malware also known as FinFisher.

Security researchers from Kaspersky spotted a new campaign in June 2019, targeting mobile device users in Myanmar. The Finspy malware developed by German company Gamma Group and it sells the malware to government and law enforcement organizations around the world.

The malware is capable of stealing sensitive information such as contacts, SMS/MMS messages, emails, calendars, GPS location, photos, files in memory, phone call recordings and data from the most popular messengers such as Whatsapp and Telegram.

FinSpy has proven very successful in operations around the world for several years, and it helps government and law enforcement organizations valuable intelligence has been agencies to gather informations about Target Individuals and Organizations.

FinSpy for iOS

It records all device activities that includes VoIP calls, Skype or WhatsApp, signal, Telegram, and other messengers. It can be installed on the jailbroken devices, once installed it unlimited monitoring access to the device.

The malware can be installed by an attacker to the phone if they have physical access, and remotely through SMS messages, emails and WAP Push.

The malware contains following data collection modules

.hdutils – Targets incoming SMS messages.
.chext – Targets messenger applications to exfiltrate informations.
keys – Handles keylogging activity.
.vpext – Records VoIP calls.

FinFisher for Android

The Android version has similar functionality like iOS, in addition to that, it is capable of gaining root access by exploiting the DirtyCow privilege escalation vulnerability.

As like iOS variant it can de installed physically and remotely, once installed it employees DirtyCow vulnerability to elevate privileges and gains root access.

“The implant provides access to information such as contacts, SMS/MMS messages, calendars, GPS location, pictures, files in memory and phone call recordings. All the exfiltrated data is transferred to the attacker via SMS messages or via the internet,” reads the report.

Kaspersky researchers detected the implants in more than 20 countries, and the “FinSpy developers are constantly working on the updates for their malware. At the time of publication, Kaspersky researchers have found another version of the threat and are currently investigating this case.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read

25 Million Android Users Infected with Powerful “Agent Smith” Malware Through Exploiting Several Mobile Vulnerabilities

More than 1,300 Android Apps Steals user Data Even After the Permission Denied


Latest articles

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that...

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices,...

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine,...

Santander Data Breach: Hackers Accessed Company Database

Santander has confirmed that there was a major data breach that affected its workers...

U.S. Govt Announces Rewards up to $5 Million for North Korean IT Workers

The U.S. government has offered a prize of up to $5 million for information...

Russian APT Hackers Attacking Critical Infrastructure

Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated...

Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles