July 6, 2022

Spyware in the Enterprise

How Lookout Protects Against Mobile Spyware and Surveillanceware

Lookout admins should make sure the default surveillanceware and device exploitation detection policies are turned on and set to block any infected device from internet access. In addition, enabling Phishing and Content Protection will protect both managed and BYOD devices against malicious payloads delivered via phishing links, which is typically how surveillanceware is initially deployed.

Overview

Researchers on the Lookout Threat Intelligence team recently discovered and disclosed an app-based surveillanceware tool dubbed Hermit. The team uncovered evidence of the spyware deployed in multiple countries: in Italy by Italian law enforcement, in northern Syria by an unknown actor and in Kazakhstan, likely by the Kazakh government. Hermit is developed by Italian-based RCS Lab, a spyware vendor that has a history of engaging governments with poor human rights records. The spyware can observe device data such as accounts, contacts, text messages, location, calendar, call logs, notifications, phone number and browser data. Hermit can also take pictures from the device’s camera, record audio, steal files and run exploits to gain privileged access to all data.

Lookout Analysis

While Hermit was only found to be used by nation states at this time, the core functionality exemplifies how mobile surveillanceware could adversely affect enterprise organizations. A threat actor could use mobile spyware like Hermit to target an employee, exploit their device and steal corporate data on that device. By recording audio or taking photos, the attacker could steal proprietary information or even use it to extort the employee and turn them into an insider threat.

Public reporting of the “lawful intercept” industry shows the increasing commercialization of mobile spyware. RCS Lab joins others, such as Gamma Group and Cytrox, that actively develop and sell surveillanceware. Despite claims that they only sell to organizations with legitimate use cases, their products have been used on innocent targets such as journalists, human rights activists and business executives. In fact, Lookout has observed Cytrox’s Predator malware being used against devices at a large European manufacturer.

One of the most infamous examples is the NSO Group, which develops the widely known Pegasus surveillanceware. Considering NSO’s financial difficulties and sanctions, there will be space at the top of the market for new players to emerge. As this commercialization continues, the goal of deploying this software could shift to broadly targeting organizations and their data.

Authors

Lookout

Cloud & Endpoint Security

Lookout is a cybersecurity company that makes it possible for tens of millions of individuals, enterprises and government agencies to be both mobile and secure. Powered by a dataset of virtually all the mobile code in the world -- 40 million apps and counting -- the Lookout Security Cloud can identify connections that would otherwise go unseen and predict and stop mobile attacks before they do harm. The world’s leading mobile network operators, including AT&T, Deutsche Telekom, EE, KDDI, Orange, Sprint, T-Mobile and Telstra, have selected Lookout as its preferred mobile security solution. Lookout is also partnered with such enterprise leaders as AirWatch, Ingram Micro, Microsoft, and MobileIron. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C.

Entry Type
Threat Guidances
Discovered By
Lookout
Threat Type
Spyware
Platform(s) Affected
Threat Guidances
Lookout
Spyware

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

HeaderHeaderHeaderHeader
CellCellCellCell
CellCellCellCell
CellCellCellCell
CellCellCellCell