Research surveys the prolific use of mobile malware in cross-platform surveillance and espionage campaigns by APT groups operating in the interest of China, Iran, North Korea and Vietnam.
Mobile malware is being pervasively used by Advanced Persistent Threat (APT) groups in combination with traditional desktop malware to perpetrate ongoing surveillance and espionage campaigns, far exceeding what was previously estimated as a more limited attack vector.
BlackBerry Limited has released a new mobile malware report, Mobile Malware and APT Espionage: Prolific, Pervasive, and Cross-Platform revealing that threat actors with distinctly different target sets are sharing attack infrastructure, and that some APTs are pivoting focus from domestic to foreign targets.
Says Eric Cornelius, Chief Technology Officer at BlackBerry Cylance: “It should come as a surprise to many to learn how coordinated and long-standing the campaigns targeting mobile users have been, as they have been easy targets for APT groups because of a historical deficit in effective security solutions for detecting and preventing mobile malware.”
As mobile devices grow in type and adoption, they provide malicious actors with a quick means to access sensitive data from select targets. The report documents several previously unidentified APT attack campaigns and new malware families, and fills gaps in other published research about mobile malware activity by known APT groups.
The researchers examined mobile and mobile/desktop campaigns by APT groups connected to China, Iran, North Korea and Vietnam, as well as two other unidentified but likely state-sponsored threat actors, all of whom were focused on foreign and/or domestic targets for economic and/or political objectives.
Previously unidentified intelligence that the report reveals includes:
- A newly identified threat actor dubbed BBCY-TA2 is utilizing a newly identified Android malware family dubbed PWNDROID3 in combination with a newly identified Windows malware family dubbed PWNWIN1 that is distributed via bogus mobile applications that mimic a popular bitcoin cashing application in a newly identified cross-platform campaign dubbed OPERATION DUALCRYPTOEX
- A newly identified threat actor dubbed BBCY-TA3 engaged in economic espionage against targets that include a range of Western and South Asian commercial enterprises in the telecommunications space as well as nearly every chemical manufacturing company in the world outside of China and is sharing attack infrastructure with BBCY-TA2
- A newly discovered cross-platform espionage campaign dubbed OPERATION OCEANMOBILE conducted by APT group OCEANLOTUS is employing a newly identified Android malware family dubbed PWNDROID1 that is being delivered via a sophisticated trio of fake mobile applications
- A newly identified cross-platform espionage campaign dubbed OPERATION DUALPAK by APT group BITTER is targeting the Pakistani military leveraging a newly identified mobile malware family dubbed PWNDROID2 that is being distributed via fake applications, SMS, WhatsApp and other social media platforms
- A second newly identified cross-platform espionage campaign leveraging interest in the recent Kashmir crisis, dubbed OPERATION DUALPAK2 and conducted by CONFUCIUS, is targeting the Pakistani government and military utilizing a newly identified Windows malware family dubbed PWNWIN2 which was distributed by way of a JavaScript version of a chat application
Says Brian Robison, Chief Evangelist at BlackBerry Cylance: “Organizations and consumers should be very concerned about what this means for not only their information, but also the safety and security of the countries in which they reside. It is clear that the market for exploits targeting mobile devices has skyrocketed, and the sheer scale of what we found—mobile malware that is interwoven with desktop malware campaigns—shows definitively that several nation states are getting in on the mobile campaign action. It is essential that organizations utilize advanced technology to protect and secure the mobile landscape.”