April 1, 2020

LightSpy

How Lookout Detects and Protects

Lookout Phishing and Content Protection will flag and block any of the URLs associated with this campaign. Since Lookout blocks the connection to the malicious URL, the LightSpy payload would not be able to be delivered as part of the Poisoned News.

Lookout Mobile Endpoint Security currently detects and protects against the Android version of LightSpy, and iOS coverage will be activated in the next version of our client, expected in early April. Lookout admins should leverage the default “OS Out of Date” protection policy to either warn the end user or block them from accessing corporate infrastructure altogether unless they install the most updated OS, which is not susceptible to these attacks.

Overview

Recently, news broke of a watering hole attack utilizing a fully remote iOS exploit chain to deploy a malware family known as LightSpy on iOS devices up to version 12.2. Dubbed Poisoned News, the campaign was also discovered to use similar capabilities to exploit Android devices using malware named dmsSpy. The goal is to compromise as many mobile devices as possible for surveillance of citizens in Hong Kong. The campaign has been attributed to a new APT group called TwoSail Junk.

Analysis

Like all watering-hole campaigns, this one leverages malicious websites that trick visitors with targeted content. This campaign posts links on multiple online forums that draw interest from Hong Kong residents, and leads them to some sites that were created specifically for this campaign and others that are legitimate but were compromised by the malicious actors. For example, the original watering hole site seen in January was meant to mimic a well-known Hong Kong newspaper called Daily Apple.

Using topics such as Coronavirus or general clickbait, the links would lead the user to legitimate-looking websites that leveraged a Safari bug that allows for exploitation of the well-known vulnerability CVE-2019-8605, which allows iOS devices to be jailbroken, but was patched by Apple in the next software update. In this case, LightSpy allows the attacker to remotely execute shell commands in order to manipulate device files. Other functionalities include the extracting contacts, the Keychain, SMS messages, GPS location, browsing history, and local network IP addresses. It can also leverage modules that exfiltrate data from popular messaging platforms.

Authors

Lookout

Cloud & Endpoint Security

Lookout is a cybersecurity company that makes it possible for tens of millions of individuals, enterprises and government agencies to be both mobile and secure. Powered by a dataset of virtually all the mobile code in the world -- 40 million apps and counting -- the Lookout Security Cloud can identify connections that would otherwise go unseen and predict and stop mobile attacks before they do harm. The world’s leading mobile network operators, including AT&T, Deutsche Telekom, EE, KDDI, Orange, Sprint, T-Mobile and Telstra, have selected Lookout as its preferred mobile security solution. Lookout is also partnered with such enterprise leaders as AirWatch, Ingram Micro, Microsoft, and MobileIron. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C.

Entry Type
Threat Guidances
Platform(s) Affected
iOS
Threat Type
Spyware
Threat Type
Malware
Platform(s) Affected
Threat Guidances
iOS
Spyware
Malware

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

HeaderHeaderHeaderHeader
CellCellCellCell
CellCellCellCell
CellCellCellCell
CellCellCellCell