MORE

    Hermit spyware on Android and iOS: What we know so far

    There is a very complex spyware called Hermit on iOS and Android. The hackers reportedly got the help of internet service providers (ISPs) to trick users into downloading malicious apps, according to research published by Google’s Threat Analysis Group (TAG). This corroborates earlier findings from security research group Lookout, which has linked the spyware, dubbed Hermit, to Italian spyware vendor RCS Labs.

    - Advertisement -

    Lookout says RCS Labs is in the same line of work as NSO Group — the infamous surveillance-for-hire company behind the Pegasus spyware — and peddles commercial spyware to various government agencies. Researchers at Lookout believe Hermit has already been deployed by the government of Italy and Kazakhstan authorities. In line with these findings, Google has identified victims in both countries and says it will notify affected users.

    As described in Lookout’s report, Hermit is a modular threat that can download additional capabilities from a command and control (C2) server. This allows the spyware to access the call records, location, photos, and text messages on a victim’s device. Hermit’s also able to record audio, make and intercept phone calls, as well as root to an Android device, which gives it full control over its core operating system.

    - Advertisement -

    The spyware can infect both Android and iPhones by disguising itself as a legitimate source, typically taking on the form of a mobile carrier or messaging app. Google’s cybersecurity researchers found that some attackers actually worked with ISPs to switch off a victim’s mobile data to further their scheme. Bad actors would then pose as a victim’s mobile carrier over SMS and trick users into believing that a malicious app download will restore their internet connectivity. If attackers were unable to work with an ISP, Google says they posed as seemingly authentic messaging apps that they deceived users into downloading.

    Researchers from Lookout and TAG say apps containing Hermit were never made available via the Google Play or Apple App Store. However, attackers were able to distribute infected apps on iOS by enrolling in Apple’s Developer Enterprise Program. This allowed bad actors to bypass the App Store’s standard vetting process and obtain a certificate that “satisfies all of the iOS code signing requirements on any iOS devices.”

    - Advertisement -

    IN THIS STORY STREAM

    Victor Tinka
    Victor Tinka
    Exploring Computer Vulnerabilities is my passion but I always find my hands dirty with code. The only “IT guy” in the family which makes me feel like the family head :)

    Fresh Tech

    Simplifi Networks signs Master Distribution Agreement with Huawei Technologies

    Simplifi Networks, in partnership with Huawei Technologies Uganda Co....

    Uganda’s Computer Misuse Act rendered null and void. Here’s why!

    In a landmark decision delivered on March 17th, 2026,...

    Sandi AI surpasses 10,000 community groups, expands into Tanzania

    Sandi AI, the pioneering artificial intelligence platform transforming community-led...

    Infinix Smart 20: Specifications and price in Uganda

    The Infinix Smart 20 has quickly become a standout...

    Uber Uganda Just Slashed Fees to 22% – Drivers Are About to Make WAY More Money!

    Uber Uganda is rolling out significant updates to its...
    - Advertisment -

    Discover more from Techjaja

    Subscribe now to keep reading and get access to the full archive.

    Continue reading