Press ESC to close

Chinese EagleMsgSpy Spyware Found Exploiting Mobile Devices Since 2017

ttribute Details
Threat Actors Chinese police departments, Wuhan ZRTZ Information Technology Co., Ltd.
Campaign Overview Surveillance tool, EagleMsgSpy, targeting mobile devices for data collection
Target Regions China (primarily Mainland), global associations
Methodology Requires physical access, installer APK delivery, headless surveillance client
Product Targeted Android mobile devices
Malware Reference EagleMsgSpy (Android surveillance malware)
Tools Used Installer APK, surveillance client, WebSockets, STOMP protocol, ApkToolPlus
Vulnerabilities Exploited Physical access requirement, installer deployment, absence of obfuscation protections
TTPs Data collection, real-time surveillance, device communication through C2 servers
Attribution Wuhan ZRTZ Information Technology Co., Ltd., backend infrastructure tied to Chinese agencies
Recommendations Strengthen device access controls, implement robust authentication methods
Source The Hacker News

Read full article: https://thehackernews.com/2024/12/chinese-eaglemsgspy-spyware-found.html

The above summary has been generated by an AI language model

Source: TheHackersNews

Published on: December 11, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *