Google Says, Hackers Used ISPs To Spread The Hermit Spyware On iOS & Android Devices

According to research from Google’s Threat Analysis Group (TAG), a sophisticated spyware operation uses internet service providers (ISPs) to deceive people into downloading harmful programs. This supports prior discoveries made by security research company Lookout, which connected the spyware, known as Hermit, to Italian spyware maker RCS Labs.

According to Lookout, RCS Labs sells commercial spyware to numerous government agencies and operates in the same industry as the infamous surveillance-for-hire firm NSO Group, which developed the Pegasus spyware. According to researchers at Lookout, Hermit has reportedly already been used by the governments of Italy and Kazakhstan. Google said it would notify affected users after identifying victims in both nations in line with these results.

According to the research from Lookout, Hermit is a modular threat that can download new capabilities from a command and control (C2) server. As a result, the spyware can access the call logs, location, pictures, and text messages stored on a victim’s device. In addition, Hermit can root an Android smartphone, which provides it complete access to the core operating system and records audio, makes, and intercept phone calls.

By posing as a trusted source, usually a mobile carrier or messaging app, the spyware can spread to both Android and iPhone devices. Google discovered that some attackers collaborated with ISPs to disable a victim’s mobile data to progress their plan. The malicious program download would lead consumers to believe that their internet connectivity will be restored, tricking the bad guys into posing as the victim’s mobile carrier over SMS.

In the event that attackers could not cooperate with an ISP, according to Google, they pretended to be genuine-looking messaging apps and tricked users into downloading them.

According to researchers from Lookout and TAG, Hermit-containing apps were never made available through the Google Play or Apple App Store. By signing up for Apple’s Developer Enterprise Program, attackers were able to spread malicious programs on iOS.

With the help of a certificate that “satisfies all of the iOS code signing requirements on any iOS devices,” malicious actors could go around the App Store’s standard verification process.

According to Apple, any accounts or certificates connected to the threat have subsequently been revoked. Google has deployed a Google Play Protect upgrade to all users and informed those affected.

Further Reading: Think Of These Top 7 Common Security Threats For Enterprise App Development

For our team’s latest technological insights and news, visit  News insights and technology updates

Recent Posts

Beware! This Android Virus Automatically Subscribe To Premium Services By Obtaining Your OTP

According to a recent analysis by Microsoft's 365 Defender Team, a kind of Android virus…

July 4, 2022

McDonald’s And IBM Partner For Hyper-Personalized Drive – Thru Experience

Both large and small brands have passed a "tipping point" when most of their interactions…

July 1, 2022

Hangouts Are No Longer Available! Google Notifies Users To Switch From Hangouts To Chats

Google initially stated that customers would switch from Hangouts to Chat in 2020; after a…

June 30, 2022

Microsoft To End Windows 8.1 Support In January 2023

Microsoft will stop offering support for Windows 8.1 in a few months. According to a…

June 29, 2022

Apple Is Developing An M3 Processor For Next-Generation Mac Devices

Apple recently debuted a few MacBooks equipped with its new Apple Silicon M2 chipset, which…

June 28, 2022

Android Auto Phone App Is Discontinued By Google

Google's Android Auto for Phone Screens software has run out of time. As of this…

June 24, 2022