FinSpy Malware Attacking iOS and Android Devices to Steal Personal Information

A powerful surveillance malware dubbed FinSpy spies on various mobile platforms that includes iOS, Android devices, and desktop platforms. The FinSpy malware also known as FinFisher.

Security researchers from Kaspersky spotted a new campaign in June 2019, targeting mobile device users in Myanmar. The Finspy malware developed by German company Gamma Group and it sells the malware to government and law enforcement organizations around the world.

The malware is capable of stealing sensitive information such as contacts, SMS/MMS messages, emails, calendars, GPS location, photos, files in memory, phone call recordings and data from the most popular messengers such as Whatsapp and Telegram.

FinSpy has proven very successful in operations around the world for several years, and it helps government and law enforcement organizations valuable intelligence has been agencies to gather informations about Target Individuals and Organizations.

FinSpy for iOS

It records all device activities that includes VoIP calls, Skype or WhatsApp, signal, Telegram, and other messengers. It can be installed on the jailbroken devices, once installed it unlimited monitoring access to the device.

The malware can be installed by an attacker to the phone if they have physical access, and remotely through SMS messages, emails and WAP Push.

The malware contains following data collection modules

.hdutils – Targets incoming SMS messages.
.chext – Targets messenger applications to exfiltrate informations.
keys – Handles keylogging activity.
.vpext – Records VoIP calls.

FinFisher for Android

The Android version has similar functionality like iOS, in addition to that, it is capable of gaining root access by exploiting the DirtyCow privilege escalation vulnerability.

As like iOS variant it can de installed physically and remotely, once installed it employees DirtyCow vulnerability to elevate privileges and gains root access.

“The implant provides access to information such as contacts, SMS/MMS messages, calendars, GPS location, pictures, files in memory and phone call recordings. All the exfiltrated data is transferred to the attacker via SMS messages or via the internet,” reads the report.

Kaspersky researchers detected the implants in more than 20 countries, and the “FinSpy developers are constantly working on the updates for their malware. At the time of publication, Kaspersky researchers have found another version of the threat and are currently investigating this case.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read

25 Million Android Users Infected with Powerful “Agent Smith” Malware Through Exploiting Several Mobile Vulnerabilities

More than 1,300 Android Apps Steals user Data Even After the Permission Denied

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research and…

2 hours ago

PoC Exploit Released for Ivanti EPM Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that could…

3 hours ago

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and scale.…

3 hours ago

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned group…

3 hours ago

New Bookworm Malware Using SLL Sideloading Technique To Windows

Cybersecurity researchers from Palo Alto Networks' Unit 42 disclosed the resurgence of the Bookworm malware,…

3 hours ago

Fake Chrome Update Delivers DriverEasy Malware by Abusing Dropbox

A recent investigation has uncovered a malicious application, DriverEasy, masquerading as a legitimate Google Chrome…

3 hours ago