hacker

A set of seemingly innocuous Android apps have been infecting Israeli users with spyware since 2018, and the campaign continues to this day.

The spyware-laden apps were discovered by researchers at Qihoo 360 who found various apps disguised as social applications, Threema, Al-Aqsa Radio, Al-Aqsa Mosque, Jerusalem Guide, PDF viewer, Wire, and other applications.

The most abused app is one pretending to be Threema, an end-to-end encrypted instant messaging application.

Laced apps used for spyware distribution
Laced apps used for spyware distribution
Source: Qihoo 360

The researchers believe the initial vector for these apps is a Facebook post or WhatsApp message that points victims to a website that hosts the APK and offers it for download.

In some cases, the messages contain a Google Drive link to a supposedly important classified PDF document.

PDF used as lure to download laced PDF reader
PDF used as a lure to download laced PDF reader
Source: Qihoo 360

The target is then urged to download an APK that pretends to be the mobile version of Adobe Reader, but which is actually spyware.

Extensive spyware set

The researchers analyzed various samples and found that the attackers use a wide range of different commodity malware for these attacks, including SpyNote, Mobihok, WH-RAT, and 888RAT.

888RAT control panel
888RAT control panel
Source: Qihoo 360

These are all commercial spyware with powerful functionality, including:

  • file exfiltration
  • call recording
  • location tracking
  • keylogging
  • photo and video capturing
  • real-time recording
  • clipboard management
  • phishing
  • shell command execution

In fewer cases, Metasploit and EsecretRAT were found in the APKs. On both occasions, the actors had implemented additional custom code on top of the open-source tools. 

EsecretRAT is based on ChatApp and is a novel spyware tool capable of exfiltrating contact lists, SMS, IMEI, location info, IP address, and all photos stored in the device. 

Signs of Hamas hackers

Qihoo 360 believes that ‘APT-C-23’, a Hamas-backed group, is behind the attacks and has been repeatedly linked with past Israel-targeting campaigns.

In October 2020, they were uncovered for using Android spyware disguised as Threema and Telegram against devices in Israel.

A few months earlier, they baited Israeli soldiers through custom spyware apps made to appear as legit dating apps.

For this campaign, which has been going on for three years, the researchers note that the attribution may be thin, but the similarities with previous APT-C-23 campaigns are strong.

If you have downloaded Threema, Telegram, PDF viewer, Al-Aqsa Radio, Al-Aqsa Mosque, and Jerusalem Guide from any site other than the Google Play Store, it is advised that you remove the app immediately and scan your device with an antivirus program.

Source: www.bleepingcomputer.com