Hospital News Hubb
Advertisement Banner
  • Home
  • News
  • Technology
  • Contact
No Result
View All Result
  • Home
  • News
  • Technology
  • Contact
No Result
View All Result
Wellnessnewshubb
No Result
View All Result
Home News

Facebook finds new Android malware used by APT hackers

admin by admin
August 5, 2022
in News


Meta (Facebook) has released its Q2 2022 adversarial threat report, and among the highlights is the discovery of two cyber-espionage clusters connected to hacker groups known as ‘Bitter APT’ and APT36 (aka ‘Transparent Tribe’) using new Android malware.

These cyberspying operatives use social media platforms like Facebook to collect intelligence (OSINT) or to befriend victims using fake personas and then drag them to external platforms to download malware.

Both APT36 and Bitter APT were observed orchestrating cyber-espionage campaigns earlier this year, so Facebook’s report gives a new dimension to their recent activities.

The Pakistan-aligned state-sponsored actor APT36 was recently exposed in a campaign targeting the Indian government using MFA-bypassing tools.

The Bitter APT was also observed in May 2022, targeting the government of Bangladesh with a new malware that featured remote file execution capabilities.

Bitter APT using new Android spyware

Meta’s report explains that Bitter APT engaged in social engineering against targets in New Zealand, India, Pakistan, and the United Kingdom, using lengthy interactions and investing significant time and effort.

The group’s goal was to infect its targets with malware, and for this purpose, it used a combination of URL shortening services, compromised sites, and third-party file hosting providers.

“This group has aggressively responded to our detection and blocking of its activity and domain infrastructure,” comments Meta in the report.

“For example, Bitter would attempt to post broken links or images of malicious links so that people would have to type them into their browser rather than click on them — all in an attempt to unsuccessfully evade enforcement.”

Bitter’s recent attacks also revealed additions in the threat actor’s arsenal in the form of two mobile apps, targeting iOS and Android users, respectively.

The iOS version was a chat app delivered via Apple’s Testflight service, a testing space for app developers. Typically, threat actors convince victims to download these chat apps by presenting them as “safer” or “more secure.”

The Android app discovered by Facebook is a new malware that Meta named ‘Dracarys,’ which abuses accessibility services to give itself increased permissions without the user’s consent. 

From there, it would inject itself into various Android apps to act as spyware, stealing text messages, installing apps, and recording audio.

“Bitter injected Dracarys into trojanized (non-official) versions of YouTube, Signal, Telegram, WhatsApp, and custom chat applications capable of accessing call logs, contacts, files, text messages, geolocation, device information, taking photos, enabling microphone, and installing apps,” explained Meta’s report.

Meta underscores that Dracarys passes undetected on all existing anti-virus engines, highlighting Bitter’s capabilities to create stealthy custom malware.

APT36 relies on commodity tools

APT36 is a much less sophisticated threat actor, yet still, a potent threat that relies on intricate social engineering tactics and readily available malware.

The latest activity discovered by Meta targeted people in Afghanistan, India, Pakistan, the United Arab Emirates, and Saudi Arabia, focusing specifically on military officials and human rights activists.

Members of APT36 created accounts on Facebook posing as recruiters for spoofed or fictitious firms and used the WeTransfer file sharing service to send supposed job offers to their targets.

The downloaded files contained a modified version of XploitSPY, which Meta named ‘LazaSpy.’ The actor’s modifications include a failed implementation of a geo-restricted targeting mechanism.

Apart from LazaSpy, APT36 also employed Mobzsar, a commodity malware that enables operators to access call logs, contact lists, SMS, GPS data, photos, and the microphone.



Source link

Previous Post

Canadian Pacific Workers Rank-and-File Committee launches Facebook page to fight hazardous working conditions on railroads

Next Post

Amazon buys Roomba maker iRobot for $1.7 billion

Next Post

Amazon buys Roomba maker iRobot for $1.7 billion

Recommended

Renewables will total 22 percent of U.S. electricity generation in 2022, says government

18 hours ago

BD begins tender offers for up to $500M in debt to advance repayment strategy

1 week ago

© 2022 Hospital News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Technology
  • Contact

Newsletter Sign Up.

No Result
View All Result
  • Home
  • News
  • Technology
  • Contact

© 2022 Hospital News Hubb All rights reserved.