Android beware: State-backed Pegasus spyware is found using phones to eavesdrop and grab data

1491309097 istock pegasus

istock-pegasus.jpg

Pegasus spyware is used to monitor activities of individual targets.


Image: iStock

A new version of one of the most sophisticated forms of mobile spyware has been discovered, and this time it’s being used to spy on Android users.

Made public last summer, the Pegasus mobile spyware was used by a nation state to monitor iPhones belonging to activists in the Middle East. Dubbed Trident, three separate iOS vulnerabilities allowed an attacker to remotely jailbreak a target’s iPhone and install spyware capable of tracking every action on the device.

ADVERTISEMENT

The discovery of the malware, built by the notorious NSO Group “cyber arms dealer”, forced Apple to release a security fix for iPhones and iPads in order to protect users.

But that wasn’t enough to put off cyber spies and state-backed actors; and a joint investigation by cybersecurity researchers at Lookout and Google has uncovered an Android version of Pegasus.

Google has dubbed it Chrysaor, naming this Android threat after the brother of Pegasus – and it’s been targeting individuals, predominantly in Israel but also in Georgia, Mexico, Turkey, the UAE and more. About three dozen specifically selected individuals have been targeted.

The Android version of this espionage tool performs similar spying functions to its iOS counterpart, allowing those using it to capture keylogs, images and live audio, monitor and extract data from apps including texts, emails, WhatsApp, Skype, Facebook and Twitter, to exfiltrate browser history and gain access to contacts.

Like its iOS counterpart, Chrysaor will also self-destruct if feels it is at risk and Pegasus for Android will remove itself from the phone of the compromised target. Mike Murray, CP of security intelligence at Lookout says the malware is “built to be stealthy, targeted, and is very sophisticated”.

However, there are differences between the iOS and Android versions of Pegasus, with Lookout noting that there’s no use of anything like Trident zero-day vulnerabilities which compromised Apple users.

Instead, Chrysaor harnesses a rooting technique called Framaroot, allowing the attackers to remotely jailbreak the device and gain permissions enabling them to access and exfiltrate data. Users became infected with the malware after being coaxed into installing malicious software onto the device through advanced phishing techniques.

This ultimately means that Pegasus for Android is easier to deploy on devices than its iOS counterpart was.

Working alongside Lookout, Google has notified potential targets about the Chrysaor threat, disabled the malware and provided them with information about removing it.

Lookout has provided full, technical research into the malware in a report titled Pegasus for Android: Technical Analysis and Findings of Chrysaor.

While this threat has been uncovered and potential victims issued with advice on how to remove Chrysaor, Lookout warns that the high proliferation of mobile devices means spies, criminals and states continue to target handsets to covertly gain information.

“Sophisticated threat actors are targeting mobile for the same reasons these devices have become ubiquitous in our personal and professional lives. The communication and data-access features, the trust users put in their devices, and the prevalence of these devices mean they also have become an effective espionage tool that well-funded attackers will continue to target”, the company warns.

Indeed, Lookout recently detailed how hackers are using social engineering to distribute malware for the purposes of spying on Israeli military personnel.

READ MORE ON CYBERCRIME

(via PCMag)

ADVERTISEMENT

ADVERTISEMENT
Just in:
Andertoons by Mark Anderson for Thu, 25 Apr 2024 // GE Jun, Chairman and CEO of TOJOY, Delivers an Inspiring Speech: “Leaping Ahead Again” // Andertoons by Mark Anderson for Fri, 26 Apr 2024 // Lee Chong Wei Shows Up On Chinese Hot cultural Talk Show “SHEDE Wisdom Talents”, Talking About “Crossing The Hill” // Liverpool FC continues international growth with first official retail partnership in South Korea // NetApp’s 2024 Cloud Complexity Report Reveals AI Disrupt or Die Era Unfolding Globally // World Intellectual Property Day: OPPO Maintains Top 10 Global IP Ranking for Fifth Consecutive Year // ByteDance Eyes US Shutdown for TikTok // UAE President, Spanish Prime Minister Hold Phone Talks // Crypto Market Poised for Boom as Baby Boomers Embrace Bitcoin ETFs // Downpours in Oman and UAE Likely Amplified by Warming Planet // Forward Fashion’s Artelli Presents: Nobuyoshi Araki’s “Paradise” Starting from April 27th, at K11 MUSEA // Oman Seeks Growth Through Strategic Economic Alliances // Abu Dhabi Unveils Online Portal to Strengthen Healthcare Workforce // Supreme Court dismisses pleas for 100% VVPAT verification // Ministry of Agriculture Supports Taiwanese Tea’s Entry into Singapore Market to Boost Global Presence // Galaxy Macau’s Sakura Cultural Festival Kicked off in Splendor // AVPN Charts Path Forward at 2024 Global Conference // Etihad Airways Announces Paris Service with A380 // DIFC Courts Cement Role as Top English Dispute Resolution Choice //