News

Published on July 24th, 2019 📆 | 1808 Views ⚑

0

Sophisticated Android spyware toolset ‘Monokle’ linked to sanctioned Russian defense contractor


iSpeech.org

A company that was sanctioned by the U.S. government for allegedly helping Russia interfere with the 2016 elections has developed an advanced set of offensive spyware tools with functionality that researchers claim they have never before witnessed in real-life attack campaigns.

Dubbed Monokle, the spyware toolset was actually developed as far back as 2015, according to a new blog post and technical report from researchers at Lookout. Samples have been observed in the wild since March 2016, with sightings peaking in the first half of 2018. But activity to this day has remained restrained and limited, suggesting that Monokle is used sparingly in highly targeted campaigns.

Typically, victims are infected when they download trojanized versions of what appear to be legitimate Android applications that otherwise operate as intended. Based largely on the apps that were chosen to carry the spyware, Lookout has assessed that the malware has been used against users based in the Caucasus region as well as those interested in Ahrar al-Sham militant group that opposes the current Syrian government under Bashar al-Assad.

Examples of trojanized apps include a messaging app called UzbekChat, Ahrar Maps ā€” offered via a third-party site with an affiliation to Ahrar al-Sham ā€” and apps that are more well-known to Americans, including Skype, Signal and Pornhub. Titles of these apps are written mostly in English, but also Arabic and Russian.

Monokle operates much like a remote access trojan (RAT) and demonstrates advanced data and media exfiltration capabilities, even without root access to the victimized device

The spyware possesses several traits that make it along the more sophisticated toolsets of its kind. First and foremost, it enables man-in-the-middle attacks against TLS- or SSL-protected traffic by allowing its operators to install their own malicious certificate to an infected deviceā€™s trusted certificates ā€” a unique ability that Lookout says has not been seen before in the wild.

Additionally, Monokle heavily abuses Android accessibility services to harvest and exfiltrate data from third-party applications by reading the text that is displayed on a deviceā€™s screen. Affected apps includes include Microsoft Word, Google Docs, Facebook Messenger, WhatsApp Skype, Snapchat and more. The surveillance-ware also captures user-defined words captured for predictive-text input ā€” which may reveal certain tendencies and interests of the target ā€” and can even record usersā€™ device screens while they are unlocking it in order to capture their PINs, patterns and passwords.





Monokle has a host of other functionality as well, including collecting contacts, call histories, browser histories and calendar information; enabling the plaintext retrieval of a userā€™s password by capturing the salt used when storing it at rest; recording calls and environmental audio; retrieving accounts and associated passwords, retrieving emails, taking screenshots, tracking device location and gathering nearby cell tower information; and more.

Lookout is attributing Monokleā€™s development to St. Petersburg, Russia-based defense contractor Special Technology Centre, Ltd. In late 2016, STC was sanctioned under former President Barack Obama for allegedly providing material support the efforts of Russian intelligence agency GRU to undermine the 2016 U.S. presidential election. (APT actor Fancy Bear, which launched cyberattacks against the Democratic National Committee, is widely recognized as a GRU-sponsored group.)

Researchers at Lookout definitively connected Monokle to STC because the spyware shares the same command-and-control infrastructure and signing certificates as STCā€™s Android antivirus solution, called Defender. The researchers also found references to several potential software developer names that are linked to both STC and Monokle.

ā€œMonokle is a great example of the larger trend of enterprises and nation-states developing sophisticated mobile malware that we have observed over the years,ā€ Lookoutā€™s blog post states.

Lookout credited the following researchers and executives as report contributors: Adam Bauer, senior staff security intelligence engineer; Apurva Kumar, staff security intelligence engineer; Christoph Hebeisen, had of research; Michael Murray, chief security officer, and Michael Flossman, former head of threat intelligence.

Source link

Tagged with: ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢



Comments are closed.