Russia

After a Russian programmer was detained by Russia's Federal Security Service (FSB) for fifteen days and his phone confiscated, it was discovered that a new spyware was secretly installed on his device upon its return.

The programmer, Kirill Parubets, was arrested by the FSB after being accused of donating to Ukraine. After regaining access to his mobile device, the programmer suspected it was tampered with by the Russian government after it exhibited unusual behavior and displayed a notifications stating, "Arm cortex vx3 synchronization."

After sharing it with Citizen Lab for forensic analysis, investigators confirmed that spyware had been installed on the device that impersonated a legitimate and popular Android app 'Cube Call Recorder,' which has over 10,000,000 downloads on Google Play.

Wiz

Contrary to the legitimate app, though, the spyware has access to a broad range of permissions, giving it unfettered access to the device and allowing the attackers to monitor the activities on the phone.

Permissions comparison
Permissions comparison
Source: Citizen Lab

Citizen Lab reports that the malware appears to be a new version of Monokle, first discovered by Lookout in 2019, which is developed by the St Peterburg-based Special Technology Center, Ltd.

It's also possible that the new malware discovered in Parubets' device is a new tool that uses parts of Monokle code as its base.

"The many significant similarities in operations, functionality, and geopolitical motivations lead us to assess that this is either an updated version of the Monokle spyware or new software created by reusing much of the same code," explains Citizen Lab.

The new spyware

The spyware implanted by FSB in the programmer's phone uses an encrypted two-stage process that mirrors the architecture of the original Monokle but includes advancements in encryption and changes in its permissions.

Its capabilities include: 

  • Track location when idle
  • Access SMS content, contacts list, and calendar entries
  • Record phone calls, screen activity, and video (via the camera)
  • Extract messages, files, and passwords
  • Execute shell commands and decrypt data
  • Perform keylogging to capture sensitive data and passwords
  • Access messages from messaging apps
  • Execute shell commands and install packages (APKs)
  • Extract passwords stored on the device and also the device unlock password
  • Exfiltrate files from the device

Citizen Labs notes that the second stage contains most of the spyware's functionality and also includes encrypted files with seemingly random names to complicate detection.

The analysts also report finding references to iOS in the spyware's code, which points to the possibility of a variant that runs on Apple iPhone devices.

Notable permission changes since the 2019 version (last documented) are the addition of 'ACCESS_BACKGROUND_LOCATION' and 'INSTALL_PACKAGES' and the removal of 'USE_FINGERPRINT' and 'SET_WALLPAPER.'

People who have their device confiscated by law enforcement and later returned should switch to another device or hand it over to experts for analysis.

Those living in oppressive countries should consider using 'burner' devices when outside and at risk of arbitrary arrests, use anti-spyware mechanisms like Apple's Lockdown mode, and keep the OS and apps up to date.

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

Related Articles:

ZeroDayRAT malware grants full access to Android, iOS devices

'NoVoice' Android malware on Google Play infected 2.3 million devices

Google adds ‘Advanced Flow’ for safe APK sideloading on Android

New ‘Perseus’ Android malware checks user notes for secrets

New BeatBanker Android malware poses as Starlink app to hijack devices