{"id":19097,"date":"2022-05-19T10:45:27","date_gmt":"2022-05-19T18:45:27","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/19\/news-12830\/"},"modified":"2022-05-19T10:45:27","modified_gmt":"2022-05-19T18:45:27","slug":"news-12830","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/19\/news-12830\/","title":{"rendered":"Spyware Vendors Target Android With Zero-Day Exploits"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/628572b8bdc4ad545af73cfb\/master\/pass\/Android-Exploits-Security-GettyImages-1159611909.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 19 May 2022 16:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">NSO Group and<\/span> its <a href=\"https:\/\/www.wired.com\/story\/nso-group-hacks-ios-android-observability\/\">powerful Pegasus malware<\/a> have dominated the debate over commercial spyware vendors who sell their hacking tools to governments, but researchers and tech companies are increasingly sounding the alarm about activity in the wider surveillance-for-hire industry. As part of this effort, Google&#x27;s Threat Analysis Group is <a data-offer-url=\"https:\/\/blog.google\/threat-analysis-group\/protecting-android-users-from-0-day-attacks\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.google\/threat-analysis-group\/protecting-android-users-from-0-day-attacks&quot;}\" href=\"https:\/\/blog.google\/threat-analysis-group\/protecting-android-users-from-0-day-attacks\" rel=\"nofollow noopener\" target=\"_blank\">publishing details<\/a> on Thursday of three campaigns that used the popular Predator spyware, developed by the North Macedonian firm Cytrox, to target Android users.<\/p>\n<p class=\"paywall\">In line with <a data-offer-url=\"https:\/\/citizenlab.ca\/2021\/12\/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/citizenlab.ca\/2021\/12\/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware\/&quot;}\" href=\"https:\/\/citizenlab.ca\/2021\/12\/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware\/\" rel=\"nofollow noopener\" target=\"_blank\">findings<\/a> on Cytrox published in December by researchers at University of Toronto\u2019s Citizen Lab, TAG saw evidence that state-sponsored actors who bought the Android exploits were located in Egypt, Armenia, Greece, Madagascar, C\u00f4te d\u2019Ivoire, Serbia, Spain, and Indonesia. And there may have been other customers. The hacking tools took advantage of five previously unknown Android vulnerabilities, as well as known flaws that had fixes available but that victims hadn\u2019t patched.<\/p>\n<p class=\"paywall\">\u201cIt&#x27;s important to shine some light on the surveillance vendor ecosystem and how these exploits are being sold,\u201d says Google TAG director Shane Huntley. \u201cWe want to reduce the ability of both the vendors and the governments and other actors who buy their products to throw around these dangerous zero-days without any cost. If there\u2019s no regulation and no downside to using these capabilities, then you\u2019ll see it more and more.\u201d<\/p>\n<p class=\"paywall\">The commercial spyware industry has given governments that don\u2019t have the funds or expertise to develop their own hacking tools access to an <a href=\"https:\/\/www.wired.com\/story\/meta-facebook-whatsapp-surveillance-for-hire\/\">expansive array<\/a> of products and surveillance services. This allows repressive regimes and law enforcement more broadly to acquire tools that enable them to surveil dissidents, human rights activists, journalists, political opponents, and regular citizens. And while a lot of attention has been focused on spyware that targets Apple\u2019s iOS, Android is the dominant operating system worldwide and has been facing similar exploitation attempts.<\/p>\n<p class=\"paywall\">\u00a0\u201cWe just want to protect users and find this activity as quickly as possible,\u201d Huntley says. \u201cWe don\u2019t think we can find everything all the time, but we can slow these actors down.\u201d<\/p>\n<p class=\"paywall\">TAG says it currently tracks more than 30 surveillance-for-hire vendors that have ranging levels of public presence and offer an array of exploits and surveillance tools. In the three Predator campaigns TAG examined, attackers sent Android users one-time links over email that looked like they had been shortened with a standard URL shortener. The attacks were targeted, focusing on just a few dozen potential victims. If a target clicked on the malicious link, it took them to a malicious page that automatically began deploying the exploits before quickly redirecting them to a legitimate website. On that malicious page, attackers deployed \u201cAlien,\u201d Android malware designed to load Cytrox&#x27;s full spyware tool, Predator.<\/p>\n<p class=\"paywall\">As is the case with iOS, such attacks on Android require exploiting a series of operating system vulnerabilities in sequence. By deploying fixes, operating system makers can break these attack chains, sending spyware vendors back to the drawing board to develop new or modified exploits. But while this makes it more difficult for attackers, the commercial spyware industry has still been able to flourish.<\/p>\n<p class=\"paywall\">\u201cWe can\u2019t lose sight of the fact that NSO Group or any one of these vendors is just one piece of a broader ecosystem,\u201d says John Scott-Railton, a senior researcher at Citizen Lab. \u201cWe need collaboration between platforms so that enforcement actions and mitigations cover the full scope of what these commercial players are doing and make it harder for them to continue.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/android-spyware-cytrox-predator-google-tag\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/628572b8bdc4ad545af73cfb\/master\/pass\/Android-Exploits-Security-GettyImages-1159611909.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 19 May 2022 16:00:00 +0000<\/strong><\/p>\n<p>New research from Google&#8217;s Threat Analysis Group outlines the risks Android users face from the surveillance-for-hire industry.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-19097","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19097"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19097\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19097"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}