TechCrunch News 03月12日 18:11
North Korean government hackers snuck spyware on Android app store
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

网络安全公司Lookout发布报告称,与朝鲜政权有关联的黑客组织将Android间谍软件上传到Google Play应用商店,并诱骗用户下载。该间谍软件名为KoSpy,能够收集包括短信、通话记录、位置数据、文件、键盘记录、Wi-Fi信息和已安装应用列表在内的敏感信息,还能录音、拍照和截屏。Lookout认为这是一次有针对性的监视行动,目标可能是特定人群,特别是韩国境内的英语或韩语使用者。Google已将相关应用从Play商店移除。

🕵️‍♂️ Lookout发现朝鲜黑客组织通过伪装成文件管理器的应用,将名为KoSpy的Android间谍软件上传至Google Play商店,该应用已被下载超过10次。

📱 KoSpy间谍软件能窃取大量敏感信息,包括短信、通话记录、设备位置、文件、键盘输入、Wi-Fi网络信息以及已安装应用列表,甚至还能录音、拍照和截取屏幕。

🎯 Lookout的分析表明,此次间谍软件活动的目标可能是特定人群,特别是位于韩国、使用英语或韩语的人士,这基于应用的名称、语言以及与朝鲜黑客组织相关的域名和IP地址。

A group of hackers with links to the North Korean regime uploaded Android spyware onto the Google Play app store and were able to trick some people into downloading it, according to cybersecurity firm Lookout.

In a report published on Wednesday, and exclusively shared with TechCrunch ahead of time, Lookout details an espionage campaign involving several different samples of an Android spyware it calls KoSpy, which the company attributes with “high confidence” to the North Korean government.

At least one of the spyware apps was at some point on Google Play and downloaded more than 10 times, according to a cached snapshot of the app’s page on the official Android app store. Lookout included a screenshot of the page in its report. 
In the last few years, North Korean hackers have grabbed headlines especially for their daring crypto heists, like the recent theft of around $1.4 billion in Ethereum from crypto exchange Bybit, with the goal of furthering the country’s banned nuclear weapons program. In the case of this new spyware campaign, however, all signs point to this being a surveillance operation, based on the functionality of the spyware apps identified by Lookout.

A screenshot of an archive version of a Google Play store page of an app that pretended to be a file manager, but was actually North Korean spyware, according to Lookout. (Image: Lookout)

The goals of the North Korean spyware campaign are not known, but Christoph Hebeisen, Lookout’s director of security intelligence research, told TechCrunch that with only a few downloads, the spyware app was likely targeting specific people. 

According to Lookout, KoSpy collects “an extensive amount of sensitive information,” including: SMS text messages, call logs, the device’s location data, files and folders on the device, user-entered keystrokes, Wi-Fi network details, and a list of installed apps. 

KoSpy can also record audio, take pictures with the phone’s cameras, and capture screenshots of the screen in use.

Lookout also found that KoSpy relied on Firestore, a cloud database built on Google Cloud infrastructure to retrieve “initial configurations.” 

Google spokesperson Ed Fernandez told TechCrunch that Lookout shared its report with the company, and “all of the identified apps were removed from Play [and] Firebase projects deactivated,” including the KoSpy sample that was on Google Play.  

“Google Play automatically protects users from known versions of this malware on Android devices with Google Play Services,” said Fernandez.  

Google did not comment on a series of specific questions about the report, including whether Google agreed with the attribution to the North Korean regime, and other details about Lookout’s report. 

Do you have more information about KoSpy, or other spyware? From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email. You also can contact TechCrunch via SecureDrop.

The report also said Lookout found some of the spyware apps on the third-party app store APKPure. An APKPure spokesperson said the company did not receive “any email” from Lookout.  

The person, or people, in control of the developer’s email address listed on the Google Play page hosting the spyware app did not respond to TechCrunch’s request for comment.

Lookout’s Hebeisen, along with Alemdar Islamoglu, a senior staff security intelligence researcher, told TechCrunch that while Lookout doesn’t have any information about who specifically may have been targeted — hacked, effectively — the company is confident that this was a highly targeted campaign, most likely going after people in South Korea, who speak English or Korean. 

Lookout’s assessment is based on the names of the apps they found, some of which are in Korean, and that some of the apps have Korean language titles and the user interface supports both languages, according to the report. 

Lookout also found that the spyware apps use domain names and IP addresses that were previously identified as being present in malware and command and control infrastructure used by North Korean government hacking groups APT37 and APT43. 

“The thing that is fascinating about the North Korean threat actors is that they are, it seems, somewhat frequently successful in getting apps into official app stores,” said Hebeisen.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

朝鲜黑客 Android间谍软件 KoSpy 网络安全 Google Play
相关文章