Article Details
Scrape Timestamp (UTC): 2025-03-12 17:40:09.276
Original Article Text
Click to Toggle View
New North Korean Android spyware slips onto Google Play. A new Android spyware named 'KoSpy' is linked to North Korean threat actors who have infiltrated Google Play and third-party app store APKPure through at least five malicious apps. According to Lookout researchers, the spyware is attributed to the North Korean threat group APT37 (aka 'ScarCruft'). The campaign has been active since March 2022, with the threat actors actively developing the malware based on newer samples. The spyware campaign primarily targets Korean and English-speaking users by disguising itself as file managers, security tools, and software updaters. The five apps Lookout identified are 휴대폰 관리자 (Phone Manager), File Manager (com.file.exploer), 스마트 관리자 (Smart Manager), 카카오 보안 (Kakao Security), and Software Update Utility. The malicious apps offer at least some of the promised functionality but load the KoSpy spyware in the background. The only exception is Kakao Security, which only displays a fake system window while requesting access to risky permissions. The campaign was attributed to APT37 based on IP addresses previously linked to North Korean operations, domains that facilitated the distribution of Konni malware, and infrastructure that overlaps with APT43, another DPRK-sponsored threat group. KoSpy details Once active on the device, KoSpy retrieves an encrypted configuration file from a Firebase Firestore database to evade detection. Next, it connects to the actual command and control (C2) server and runs checks to ensure it's not running in an emulator. The malware can retrieve updated settings from the C2, additional payloads to execute, and be activated/deactivated dynamically via an "on/off" switch. KoSpy's data collection capabilities are: Each app uses a separate Firebase project and C2 server for the data exfiltration, which is encrypted with a hardcoded AES key prior to transmission. Although the spyware apps have now been removed from both Google Play and APKPure, users will need to manually uninstall them and scan them with security tools to uproot any remnants of the infection from their devices. In critical cases, a factory reset is recommended. Google Play Protect is also able to block known malicious apps, so enabling it on up-to-date Android devices can help protect against KoSpy. A Google spokesperson confirmed to BleepingComputer that all the KoSpy apps identified by Lookout have been removed from Google Play and that the corresponding Firebase projects have also been taken down. "The use of regional language suggests this was intended as targeted malware. Before any user installations, the latest malware sample discovered in March 2024 was removed from Google Play," Google told BleepingComputer. "Google Play Protect automatically protects Android users from known versions of this malware on devices with Google Play Services, even when apps come from sources outside of Play." Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
KoSpy, a new Android spyware, was linked to North Korean threat group APT37 and discovered in apps on Google Play and APKPure.
The malicious apps were discovered providing limited legitimate functionalities while installing spyware in the background.
Lookout researchers traced the spyware campaign to APT37 through IP addresses and domains connected to other North Korean operations.
Once installed, KoSpy avoids detection by retrieving encrypted configurations and connects to a command and control server for further instructions.
The spyware targets data collection and commands can be dynamically updated, posing serious privacy and security risks to users.
Despite the removal of these apps from Google Play and APKPure, affected users must manually uninstall them and potentially perform a factory reset.
Google has taken measures to mitigate further risks by removing related apps and Firebase projects, enhancing protection with Google Play Protect.
The targeted deployment of these apps was specifically aimed toward Korean and English-speaking users, indicating a focused cyber-espionage effort.