• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
fsb uses trojan app to monitor russian programmer accused of

FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine

You are here: Home / General Cyber Security News / FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine
December 6, 2024

A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware by the Federal Security Service (FSB) after he was detained earlier this year.

The findings come as part of a collaborative investigation by First Department and the University of Toronto’s Citizen Lab.

“The spyware placed on his device allows the operator to track a target device’s location, record phone calls, keystrokes, and read messages from encrypted messaging apps, among other capabilities,” according to the report.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In May 2024, Kirill Parubets was released from custody after a 15-day period in administrative detention by Russian authorities, during which time his phone, an Oukitel WP7 phone running Android 10, was confiscated from him.

Cybersecurity

During this period, not only was he beaten to compel him into revealing his device password, he was also subjected to an “intense effort” to recruit him as an informant for the FSB, or else risk facing life imprisonment.

After agreeing to work for the agency, if only to buy some time and get away, the FSB returned his device at its Lubyanka headquarters. It’s at this stage that Parubets began noticing that the phone exhibited unusual behavior, including a notification that said “Arm cortex vx3 synchronization.”

A further examination of the Android device has since revealed that it was indeed tampered with a trojanized version of the genuine Cube Call Recorder application. It’s worth noting that the legitimate app has the package name “com.catalinagroup.callrecorder,” whereas the rogue counterpart’s package name is “com.cortex.arm.vx3.”

The counterfeit app is designed to request intrusive permissions that allow it to gather a wide range of data, including SMS messages, calendars, install additional packages, and answer phone calls. It can also access fine location, record phone calls, and read contact lists, all functions that are part of the legitimate app.

“Most of the malicious functionality of the application is hidden in an encrypted second stage of the spyware,” the Citizen Lab said. “Once the spyware is loaded onto the phone and executed, the second stage is decrypted and loaded into memory.”

Russian Programmer

The second stage incorporates features to log keystrokes, extract files and stored passwords, read chats from other messaging apps, inject JavaScript, execute shell commands, obtain the device unlock password, and even add a new device administrator.

The spyware also exhibits some level of overlap with another Android spyware called Monokle that was documented by Lookout in 2019, raising the possibility that it’s either an updated version or that it’s been built by reusing Monokle’s codebase. Specifically, some of the command-and-control (C2) instructions between the two strains have been found to be identical.

The Citizen Lab said it also spotted references to iOS in the source code, suggesting that there could be an iOS version of the spyware.

Cybersecurity

“This case illustrates that the loss of physical custody of a device to a hostile security service like the FSB can be a severe risk for compromise that will extend beyond the period where the security services have custody of the device,” it said.

The disclosure comes as iVerify said it discovered seven new Pegasus spyware infections on iOS and Android devices belonging to journalists, government officials, and corporate executives. The mobile security firm is tracking the spyware developer, NSO Group, as Rainbow Ronin.

“One exploit from late 2023 on iOS 16.6, another potential Pegasus infection in November 2022 on iOS 15, and five older infections dating back to 2021 and 2022 across iOS 14 and 15,” security researcher Matthias Frielingsdorf said. “Each of these represented a device that could have been silently monitored, its data compromised without the owner’s knowledge.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «researchers uncover flaws in popular open source machine learning frameworks Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks
Next Post: Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok romania cancels presidential election results after alleged russian meddling on»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.