Article Details

Scrape Timestamp (UTC): 2024-12-12 13:40:28.482

Source: https://thehackernews.com/2024/12/gamaredon-deploys-android-spyware.html

Original Article Text

Click to Toggle View

Gamaredon Deploys Android Spyware "BoneSpy" and "PlainGnome" in Former Soviet States. The Russia-linked state-sponsored threat actor tracked as Gamaredon has been attributed to two new Android spyware tools called BoneSpy and PlainGnome, marking the first time the adversary has been discovered using mobile-only malware families in its attack campaigns. "BoneSpy and PlainGnome target former Soviet states and focus on Russian-speaking victims," Lookout said in an analysis. "Both BoneSpy and PlainGnome collect data such as SMS messages, call logs, phone call audio, photos from device cameras, device location, and contact lists." Gamaredon, also called Aqua Blizzard, Armageddon, BlueAlpha, Hive0051, Iron Tilden, Primitive Bear, Shuckworm, Trident Ursa, UAC-0010, UNC530, and Winterflounder, is a hacking group affiliated with Russia's Federal Security Service (FSB). Last week, Recorded Future's Insikt Group revealed the threat actor's use of Cloudflare Tunnels as a tactic to conceal its staging infrastructure hosting malicious payloads such as GammaDrop. It's believed that BoneSpy has been operational since at least 2021. On the other hand, PlainGnome emerged only earlier this year. Targets of the campaign possibly include Uzbekistan, Kazakhstan, Tajikistan, and Kyrgyzstan based on VirusTotal submissions of the artifacts. There is no evidence at this stage that the malware was used to target Ukraine, which has been the group's sole focus. Back in September 2024, ESET also disclosed that Gamaredon unsuccessfully attempted to infiltrate targets in several NATO countries, namely Bulgaria, Latvia, Lithuania, and Poland in April 2022 and February 2023. Lookout has theorized that the targeting of Uzbekistan, Kazakhstan, Tajikistan, and Kyrgyzstan "may be related to worsening relations between these countries and Russia since the outbreak of the Ukraine invasion." The attribution of the new malware to Gamaredon stems from the reliance on dynamic DNS providers and overlaps in IP addresses that point to command-and-control (C2) domains used in both mobile and desktop campaigns. BoneSpy and PlainGnome share a crucial difference in that the former, derived from the open-source DroidWatcher spyware, is a standalone application, whereas the latter acts as a dropper for a surveillance payload embedded within it. PlainGnome is also a custom-made malware but one that requires the victim to grant it permission to install other apps through REQUEST_INSTALL_PACKAGES. Both surveillance tools implement a broad range of functions to track location, gather information about the infected device, and collect SMS messages, call logs, contact lists, browser history, audio recordings, ambient audio, notifications, photos, screenshots, and cellular service provider details. They also attempt to gain root access. The exact mechanism by which the malware-laced apps are distributed remains unclear, but it's suspected to involve targeted social engineering, masquerading themselves as battery charge monitoring apps, photo gallery apps, a fake Samsung Knox app, and a fully functional-but-trojanized Telegram app. "While PlainGnome, which first surfaced this year, has many overlaps in functionality with BoneSpy, it does not appear to have been developed from the same code base," Lookout said.

Daily Brief Summary

NATION STATE ACTIVITY // Russia's Gamaredon Group Deploys New Spyware in Ex-Soviet States

Russia-linked Gamaredon, known for multiple aliases including Aqua Blizzard and Shuckworm, has expanded its cyber arsenal with Android spyware tools, BoneSpy and PlainGnome.

The new spyware specifically targets former Soviet states, aiming at Russian-speaking populations and collecting sensitive data like SMS, call logs, photos, and location.

BoneSpy, operational since 2021, and PlainGnome, first detected in 2023, mark the first known campaign by Gamaredon using exclusively mobile malware.

There is no indication that these tools were used against Ukraine, where Gamaredon's activities have typically been focused.

The deployment regions for these spyware tools potentially include Uzbekistan, Kazakhstan, Tajikistan, and Kyrgyzstan, reflecting possibly deteriorating relations with Russia.

The malware employs sophisticated spying functions, such as information gathering on device details, communications, and user behavior, and attempts to gain device root access.

Distribution methods for the malicious apps are believed to include deceptive tactics like masquerading as legitimate apps or updates.

Recorded Future highlighted Gamaredon's tactic of utilizing Cloudflare Tunnels to hide infrastructure meant for hosting malicious operations.