Kaspersky shares new details about watering-hole attacks targeting mobile users in Southeast Asia

Image
ANI Mobile
Last Updated : Mar 27 2020 | 2:35 PM IST

Earlier in March, Trend Micro published research on a watering-hole campaign targeting users in Southeast Asia with powerful spyware called LightSpy. Following that research, Kaspersky's Global Research and Analysis Team shared some important additional details on this attack targeting mobile users through links on various forums and communications channels.

In their research, published on Securelist.com, Kaspersky provides an analysis of:

- The surveillance framework's deployment timeline starting from January 2020 - Previously unknown samples of the LightSpy Android implants- Traces of implants targeting Windows, Mac and Linux based computers along with Linux-based routers- New indicators of compromise and some other details about the attack

What is known about the LightSpy attacks?

Actors behind the campaign distribute links to malicious websites mimicking the original ones that are likely to be frequented by potential victims. Once a target visits the weaponized website, a custom exploit chain tries to execute a shellcode, which leads to the deployment of the full original malware on the victim's phone.

Landing page of watering hole site

The malware is successfully targeting iPhones running versions of iOS up to version 12.2. Users running the latest version of iOS, 13.4, should be safe from these exploits. Users of Android OS-based devices are also in the crosshairs - researchers found several versions of the implant that target this platform. In addition, Kaspersky researchers identified some indicators of the existence of malware targeting Mac, Linux and Windows-based computers, along with Linux-based routers.

The research also discovered the malware is being spread through forum posts and replies, as well as popular communications platforms by posting links to the deployed landing pages. Once the website has been visited, the malware jailbreaks the victim's device, giving the attackers the ability to record calls and audio, read certain messengers and more.

The information currently available does not make it possible to attribute the operation to any known advanced persistence threat actor (APT), which is why Kaspersky has temporarily dubbed the attackers "TwoSail Junk".

"We tracked this particular framework and infrastructure beginning in January this year. It is an interesting example of an agile approach to developing and deploying surveillance framework in Southeast Asia. This innovative strategy is something we have seen before from SpringDragon, and LightSpy's targeting geolocation falls within the previous regional targeting of the SpringDragon/LotusBlossom/Billbug APT, as does the infrastructure and "evora" backdoor use. Although the campaign peaked in February - that is when we saw the highest growth of links leading to the malicious site - it is still active and we continue monitoring it," comments Alexey Firsh, a security researcher at Kaspersky's Global Research and Analysis Team.

To avoid falling victim to waterholing and other targeted attacks such as this, Kaspersky recommends the following:

Try to avoid suspicious links promising exclusive content, especially if they are shared on social media. Refer to official sources for trustworthy and legitimate information.

Check the website's authenticity. Do not visit websites until you are sure that they are legitimate and start with 'https'. Confirm that the website is genuine, by double-checking the format of the URL or the spelling of the company name, reading reviews about it and checking the domain's registration data.

Choose a reliable security solution such as Kaspersky Security Cloud for effective personal protection against known and unknown threats.

Disclaimer: No Business Standard Journalist was involved in creation of this content

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Mar 27 2020 | 2:23 PM IST

Next Story