• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers link dragonegg android spyware to lightspy ios surveillanceware

Researchers Link DragonEgg Android Spyware to LightSpy iOS Surveillanceware

You are here: Home / General Cyber Security News / Researchers Link DragonEgg Android Spyware to LightSpy iOS Surveillanceware
October 4, 2023

New findings have recognized connections in between an Android spyware termed DragonEgg and yet another refined modular iOS surveillanceware device named LightSpy.

DragonEgg, along with WyrmSpy (aka AndroidControl), was to start with disclosed by Lookout in July 2023 as a strain of malware able of gathering delicate facts from Android equipment. It was attributed to the Chinese country-point out group.

On the other hand, particulars about LightSpy arrived to light in March 2020 as section of a marketing campaign dubbed Operation Poisoned News in which Apple iPhone buyers in Hong Kong have been specific with watering gap attacks to put in the spy ware.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Now, according to Dutch mobile security company ThreatFabric, the attack chains involve the use of a trojanized Telegram app that is made to obtain a next-phase payload (smallmload.jar), which, in transform, is configured to download a third part codenamed Core.

More examination of the artifacts has disclosed that the implant has been actively taken care of considering the fact that at the very least December 11, 2018, with the most current model released on July 13, 2023.

The main module of LightSpy (i.e., DragonEgg) features as an orchestrator plugin responsible for accumulating the gadget fingerprint, developing get hold of with a remote server, awaiting further guidance, and updating by itself as perfectly as the plugins.

“LightSpy Core is very adaptable in conditions of configuration: operators can precisely manage the spyware applying the updatable configuration,” ThreatFabric mentioned, noting that WebSocket is used for command delivery and HTTPS is applied for data exfiltration.

Spyware

Some of the notable plugins incorporate a locationmodule that tracks victims’ exact destinations, soundrecord that can seize ambient audio as well as from WeChat VOIP audio discussions, and a monthly bill module to gather payment record from WeChat Pay.

LightSpy’s command-and-manage (C2) contains numerous servers situated in Mainland China, Hong Kong, Taiwan, Singapore, and Russia, with the malware and WyrmSpy sharing the identical infrastructure.

Cybersecurity

ThreatFabric reported it also recognized a server hosting knowledge from 13 exclusive phone numbers belonging to Chinese cell phone operators, elevating the possibility that the knowledge possibly represents the tests numbers of LightSpy builders or victims’.

The backlinks amongst DragonEgg and LightSpy stem from similarities in configuration designs, runtime composition and plugins, and the C2 communication structure.

“The way the threat actor group dispersed the initial destructive phase inside of popular messenger was a clever trick,” the business claimed.

“There were quite a few positive aspects of that: the implant inherited all the access permissions that the provider application had. In the case of messenger, there were being a large amount of non-public permissions this kind of as digicam and storage access.”

Observed this short article attention-grabbing? Stick to us on Twitter  and LinkedIn to browse additional exclusive written content we put up.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «wing disrupts the market by introducing affordable saas security Wing Disrupts the Market by Introducing Affordable SaaS Security
Next Post: Atlassian Confluence Hit by Newly Actively Exploited Zero-Day – Patch Now atlassian confluence hit by newly actively exploited zero day – patch»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.