In a press release earlier today (11 July), Kaspersky revealed that its experts have uncovered new versions of the advanced malicious surveillance tool ‘FinSpy’. The new implants work on both iOS and Android devices, can monitor activity on almost all popular messaging services, including encrypted ones, and hide their traces better than before.

The basic functionality of the malware includes almost unlimited monitoring of the device’s activities: such as geolocation, all incoming and outgoing messages, contacts, media stored on the device, and data from popular messaging services like WhatsApp, Facebook messenger or Viber. All the exfiltrated data is transferred to the attacker via SMS messages or the HTTP protocol.

The latest known versions of the malware extend the surveillance functionality to additional messaging services, including those considered ‘secure’, such as Telegram, Signal or Threema. They are also more adept at covering their tracks, noted Kaspersky.

For instance, the iOS malware, targeting iOS 11 and older versions can now hide signs of jailbreak, while the new version for Android contains an exploit capable of gaining root privileges – almost unlimited, complete access to all files and commands – on an unrooted device.

Based on the information available to Kaspersky, in order to successfully infect both Android and iOS-based devices, attackers need either physical access to the phone or an already jailbroken/rooted device. For jailbroken/rooted phones there are at least three possible infection vectors: SMS message, email, or push notifications.

According to Kaspersky telemetry, several dozen mobile devices have been infected over the past year.

“The developers behind FinSpy constantly monitor security updates for mobile platforms and tend to quickly change their malicious programs to avoid their operation being blocked by fixes. Moreover, they follow trends and implement functionality to exfiltrate data from applications that are currently popular,” said Alexey Firsh, security researcher at Kaspersky Lab.

“We observe victims of the FinSpy implants on a daily basis, so it’s worth keeping an eye on the latest platform updates and install them as soon as they are released. Because, regardless of how secure the apps you use might be, and how protected your data, once the phone is rooted or jailbroken, it is wide open to spying,” he added.

To avoid falling victim to FinSpy, Kaspersky researchers suggest users to practise the following measures:

  • Do not leave your smartphone or tablet unlocked and always make sure nobody is able to see your pin-code when you enter it.
  • Do not jailbreak or root your device since it will make an attacker’s job easier.
  • Only install mobile applications from official app stores, such as Google Play.
  • Do not follow suspicious links sent to you from unknown numbers.
  • In your device settings, block the installation of programs from unknown sources.
  • Avoid disclosing the password or passcode to your mobile device, even with someone you trust.
  • Never store unfamiliar files or applications on your device, as they could harm your privacy.
  • Download a proven security solution for mobile devices, such as Kaspersky Internet Security for Android.

For the full report, click here.

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
You May Also Like

Staying informed, entertained, connected as you #StayHome with Twitter

Countries across the globe have mandated remote working and home-based learning to…

Twitter unveils algorithmic fairness initiative

Twitter said Wednesday it was launching an initiative on “responsible machine learning”…

Shuttered Zoom accounts raise China free speech fears

by Yan Zhao with Shaun Tandon in Washington Several Zoom meetings involving…

Australian finance company refuses hackers’ ransom demand

Australian consumer lending company, Latitude Financial, announced that it will not pay a ransom to hackers who stole millions of records of around 14 million Australian and New Zealand customers. The company received a ransom threat from the group behind the cyber attack but ignored it in line with government advice. The stolen data includes 7.9 million Australian and New Zealand driving licenses and 53,000 passport numbers, as well as other personal information such as names, addresses, and telephone numbers. The Australian government has warned that paying a ransom only encourages further extortion attempts.