Spyware in bogus Android apps is attributed to North Korean group
朝鲜支持的黑客利用恶意软件KoSpy感染安卓设备,目标为韩语和英语使用者。该软件可窃取敏感数据如通话记录、短信及位置信息,并伪装成实用工具应用传播。Google已下架相关应用。该恶意软件与朝鲜骇客组织ScarCruft关联,主要针对韩国用户并波及多国。 2025-3-12 15:16:33 Author: therecord.media(查看原文) 阅读量:2 收藏

North Korean state-backed hackers infected Android devices with malware intended to spy on Korean and English speakers, researchers said Wednesday.

Mobile and cloud security firm Lookout labeled the malware KoSpy and said it appears to be the worth of an advanced persistent threat group tracked as ScarCruft or APT37.

KoSpy, which the company spotted on the Google Play Store and third-party app stores, is able to gather significant amounts of sensitive data, including call logs, text messages, files, audio, screenshots and user location, according to the report. 

The malware has been embedded in bogus utility apps with titles such as File Manager, Software Update Utility and Kakao Security, Lookout said. Google has taken down all of the known infected apps, the researchers said.

KoSpy was first seen in March 2022 and new samples were spotted as recently as last year, Lookout said.

“More than half of the apps have Korean language titles and the UI supports two languages: English and Korean,” Lookout said. “The messages and text fields in the app are shown in Korean if the device language is set to Korean and in English otherwise. “

KoSpy appears to share infrastructure with the North Korean state-sponsored group tracked as Kimsuky or APT43. Those hackers are reportedly behind a wave of spearphishing attacks that deploy malware to steal information, a campaign known as forceCopy.

ScarCruft, the group linked to KoSpy, has been operating since 2012. While it mainly targets South Koreans, it has also attacked users in Japan, Vietnam, Russia, Nepal, China, India, Romania, Kuwait and several countries in the Mideast, Lookout said.

An espionage campaign targeting media organizations and high-profile academics was attributed to ScarCruft in January.

In October, researchers linked a malware operation in Southeast Asia to the group.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.


文章来源: https://therecord.media/north-korea-malware-android-apps-kospy-apt37-scarcruft
如有侵权请联系:admin#unsafe.sh