Original Article Text

Click to Toggle View

SpyNote Android malware spreads via fake volcano eruption alerts. The Android 'SpyNote' malware was observed in attacks targeting Italy using a fake 'IT-alert' public alert service that infected visitors with the information-stealing malware. IT-alert is a legitimate public service operated by the Italian government, specifically the Department of Civil Protection, to provide emergency alerts and guidance to the population during imminent or ongoing disasters such as wildfires, floods, earthquakes, etc. Italian researchers at the D3Lab first spotted the fake IT-alert site, which is warning of an elevated possibility of an upcoming volcano eruption, urging visitors to install the app to remain informed. If the download button is clicked from an iOS device, the user is redirected to the real IT-alert site, but Android users attempting to download the app directly receive 'IT-Alert.apk.' The APK (Android package) file installs SpyNote malware on the device, granting it permission to use Accessibility services, which enable the attackers to perform a wide range of dangerous and invasive actions on the compromised device. SpyNote can also perform overlay injection attacks to steal user credentials when the victim opens banking, cryptocurrency wallet, and social media applications. Other documented capabilities of the particular malware include camera recording, GPS and network location tracking, standard keylogging, screenshot capturing, phone call recording, and targeting Google and Facebook accounts. SpyNote spikes after source code leak The SpyNote Android malware was first documented in 2022 and is now in its third major version, which is sold to cybercriminals through Telegram. In January 2023, a ThreatFabric report warned that SpyNote detections spiked following the source code leak of one of its variants, codenamed 'CypherRat.' Some of those who got their hands on the leaked source code created custom variants targeting specific banks, while others opted to masquerade it as Google's Play Store, Play Protect, WhatsApp, and Facebook. Late last week, a report from F-Secure highlighted the rising prominence of SpyNote, providing a detailed analysis of its features and capabilities. To defend from these threats, avoid downloading and installing APKs from outside the Play Store unless you specifically trust the publisher.

Daily Brief Summary

MALWARE // Fake Volcano Alert App in Italy Distributes SpyNote Android Malware

The Android-based 'SpyNote' malware is being distributed through a false 'IT-alert' public service application, simulating a legitimate service run by the Italian Department of Civil Protection.

The fake IT-alert warns of a raised threat of a volcanic eruption, prompting visitors to download the application in order to receive updated information.

If clicked from an Android device, the download button initiates the installation of an APK file that deploys the SpyNote malware onto the device, providing attackers access to a range of invasive actions.

The malware can also perform overlay injection attacks for stealing user credentials when the user accesses banking, cryptocurrency wallet, and social media applications.

SpyNote was first documented in 2022 and its detection saw a significant increase after the source code of a variant, 'CypherRat,' was leaked, leading to creation of custom versions targeting specific banks, as well as masquerading as Google's Play Store and other reputable apps.

In response to these threats, users have been advised to refrain from downloading and installing APKs from sources outside of the Google Play Store unless they trust the source explicitly.