Gamaredon Expands Arsenal: New Android Spyware Emerges

Listen to this Post

2024-12-12

A Persistent Threat

The Russia-linked hacking group, Gamaredon, known for its relentless cyberespionage activities, has recently been linked to two new Android spyware tools: BoneSpy and PlainGnome. This development marks a significant shift in the group’s tactics, as it is the first time they have been observed deploying mobile-specific malware.

Targeting Former Soviet States

Both BoneSpy and PlainGnome are primarily designed to target individuals residing in former Soviet states, particularly those who speak Russian. These malicious apps are capable of collecting a wide range of sensitive information, including:

SMS messages

Call logs

Phone call audio

Device camera photos

Device location

Contact lists

A Sophisticated Operation

Gamaredon, a seasoned cyber threat actor, has demonstrated its ability to adapt and innovate. Last week, it was revealed that the group was leveraging Cloudflare Tunnels to obfuscate its malicious infrastructure and deploy payloads like GammaDrop.

BoneSpy, the older of the two spyware tools, has been active since at least 2021. PlainGnome, on the other hand, is a more recent development, emerging earlier this year. The primary targets of these campaigns appear to be Uzbekistan, Kazakhstan, Tajikistan, and Kyrgyzstan.

A Broader Scope

In September 2024, ESET uncovered Gamaredon’s attempts to infiltrate targets in several NATO countries, including Bulgaria, Latvia, Lithuania, and Poland. This suggests that the group’s ambitions extend beyond its traditional focus on former Soviet states.

The Why Behind the Attacks

Lookout theorizes that the targeting of Central Asian nations may be linked to the deteriorating relationship between these countries and Russia following the invasion of Ukraine.

Technical Analysis

Both BoneSpy and PlainGnome share some commonalities, such as the use of dynamic DNS providers and overlapping IP addresses linked to their command-and-control infrastructure. However, they also exhibit key differences.

BoneSpy: A standalone application derived from the open-source DroidWatcher spyware.
PlainGnome: A custom-made malware that requires user permission to install additional apps.

Both tools possess a wide range of capabilities, including:

Location tracking

Device information gathering

SMS and call log interception

Contact list extraction

Browser history monitoring

Audio recording

Screenshot capture

Cellular service provider information collection

Root access attempts

Distribution Tactics

While the exact distribution methods remain unclear, it is believed that the malware-laden apps are disseminated through targeted social engineering attacks. They may be disguised as legitimate applications, such as battery charge monitors, photo gallery apps, or even a seemingly functional Telegram app.

What Undercode Says:

Gamaredon’s expansion into mobile malware signifies a growing threat to individuals and organizations worldwide. The group’s ability to adapt to evolving technologies and target a wider range of victims highlights the need for increased vigilance and robust cybersecurity measures.

The use of sophisticated techniques, such as Cloudflare Tunnels, underscores the importance of threat intelligence and proactive defense strategies. Organizations must stay informed about the latest tactics, techniques, and procedures employed by advanced threat actors like Gamaredon.

Mobile devices have become integral to our daily lives, making them prime targets for cyberattacks. It is crucial to exercise caution when downloading and installing apps, especially those from unknown sources. Users should be wary of suspicious messages or emails that may contain malicious links or attachments.

By understanding the threats posed by Gamaredon and other cyber adversaries, individuals and organizations can take steps to protect themselves and mitigate the risks associated with mobile malware.

References:

Reported By: Thehackernews.com
https://www.instagram.com
Wikipedia: https://www.wikipedia.org
Undercode AI: https://ai.undercodetesting.com

Image Source:

OpenAI: https://craiyon.com
Undercode AI DI v2: https://ai.undercode.helpFeatured Image