MORE

    Hermit spyware on Android and iOS: What we know so far

    There is a very complex spyware called Hermit on iOS and Android. The hackers reportedly got the help of internet service providers (ISPs) to trick users into downloading malicious apps, according to research published by Google’s Threat Analysis Group (TAG). This corroborates earlier findings from security research group Lookout, which has linked the spyware, dubbed Hermit, to Italian spyware vendor RCS Labs.

    - Advertisement -

    Lookout says RCS Labs is in the same line of work as NSO Group — the infamous surveillance-for-hire company behind the Pegasus spyware — and peddles commercial spyware to various government agencies. Researchers at Lookout believe Hermit has already been deployed by the government of Italy and Kazakhstan authorities. In line with these findings, Google has identified victims in both countries and says it will notify affected users.

    As described in Lookout’s report, Hermit is a modular threat that can download additional capabilities from a command and control (C2) server. This allows the spyware to access the call records, location, photos, and text messages on a victim’s device. Hermit’s also able to record audio, make and intercept phone calls, as well as root to an Android device, which gives it full control over its core operating system.

    - Advertisement -

    The spyware can infect both Android and iPhones by disguising itself as a legitimate source, typically taking on the form of a mobile carrier or messaging app. Google’s cybersecurity researchers found that some attackers actually worked with ISPs to switch off a victim’s mobile data to further their scheme. Bad actors would then pose as a victim’s mobile carrier over SMS and trick users into believing that a malicious app download will restore their internet connectivity. If attackers were unable to work with an ISP, Google says they posed as seemingly authentic messaging apps that they deceived users into downloading.

    Researchers from Lookout and TAG say apps containing Hermit were never made available via the Google Play or Apple App Store. However, attackers were able to distribute infected apps on iOS by enrolling in Apple’s Developer Enterprise Program. This allowed bad actors to bypass the App Store’s standard vetting process and obtain a certificate that “satisfies all of the iOS code signing requirements on any iOS devices.”

    - Advertisement -

    IN THIS STORY STREAM

    Victor Tinka
    Victor Tinka
    Exploring Computer Vulnerabilities is my passion but I always find my hands dirty with code. The only “IT guy” in the family which makes me feel like the family head :)

    Fresh Tech

    Taming the Beast: How AI-Powered Traffic Lights Can Unclog Kampala’s roads

    Kampala, Uganda's bustling heart, is a city on the...

    Airplane Mode: All the productivity hacks that come with it

    Airplane mode (also known as flight mode) is a...

    The DV-2027 lottery now requires a registration fee. Here’s more

    In a notable shift for aspiring immigrants, the U.S....

    How to use and maximize Airtel Uganda’s VoLTE connectivity

    Airtel Uganda recently rolled out Voice over LTE (VoLTE),...

    All about Opera Neon – the premium, AI-powered “agentic” browser

    Opera Neon is a premium, AI-powered "agentic" browser developed...
    - Advertisment -

    Discover more from Techjaja

    Subscribe now to keep reading and get access to the full archive.

    Continue reading