Adam Adler: Iran 'hides spyware in wallpaper, restaurant and games apps'
Adam Adler ( Miami, Florida) : www.DigitalBankVault.com Iran 'hides spyware in wallpaper, restaurant and games apps'. Iran is running two surveillance operations in cyber-space, targeting more than 1,000 dissidents, according to a leading cyber-security company.
The efforts were directed against individuals in Iran and 12 other countries, including the UK and US, Check Point said.
It said the two groups involved were using new techniques to install spyware on targets' PCs and mobile devices.
And this was then being used to steal call recordings and media files.
One of the groups, known as Domestic Kitten or APT-50, is accused of tricking people into downloading malicious software on to mobile phones by a variety of means including:
repackaging an existing version of an authentic video game found on the Google Play store
mimicking an app for a restaurant in Tehran
offering a fake mobile-security app
providing a compromised app that publishes articles from a local news agency
supplying an infected wallpaper app containing pro-Islamic State imagery
masquerading as an Android application store to download further software
The American-Israeli company's researchers documented 1,200 victims being targeted by the campaign, living in seven countries.
There had been more than 600 successful infections, it said.
The second group, known as Infy or Prince Of Persia, is said to spy on the home and work PCs of dissidents in 12 countries, extracting sensitive data after tricking people into opening malicious email attachments.
The Iranian government has not commented on the report.
Domestic Kitten's operation was first identified in 2018.
And Check Point said there was evidence it had run at least 10 campaigns since 2017.
Four of these were still active, with the most recent beginning in November 2020.
And it was using an Iranian blog site, Telegram channels and text messages to lure people into installing its infected software, which the researchers have dubbed Furball, which could:
record calls and other sounds
track the device's location
collect device identifiers,
grab text messages and call logs
steal media files, including videos and photos,
obtain a list of other installed applications
steal files from external storage
The 600 successful infections are said to have included dissidents, opposition forces and people belonging to the Kurdish ethnic minority in:
The other group, Infy, is said to have been operating as far back as 2007.
Its most recent activity had targeted PCs, with fake emails with attractive content, usually with an attached document, Check Point said.
One example provided was of a document apparently about loans being offered to disabled veterans.