As the COVID-19 lockdown persists, there has been a rise in mobile threats emerging on the cybersecurity landscape. Android devices, in particular, have become the primary targets for threat actors, who are distributing fake apps in the form of malicious .APK files. These files often install banking Trojans, such as Cerberus, along with various spyware and SMS worms.
ESET’s malware expert, Lukas Stefanko, along with Malware Hunter Team, have uncovered and analysed an interesting new open-source Android Trojan called XploitSPY.
https://platform.twitter.com/embed/Tweet.html?dnt=false&embedId=twitter-widget-1&features=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%3D%3D&frame=false&hideCard=false&hideThread=false&id=1249810055924498432&lang=en-gb&origin=https%3A%2F%2Fblog.bushidotoken.net%2F2020%2F04%2Fxploitspy-new-android-spyware-designed.html&sessionId=46d451c77377382c8fe34c15a946b9f25a6cc020&theme=light&widgetsVersion=2615f7e52b7e0%3A1702314776716&width=550pxAccording to the researchers the malware has been designed by three ethical hackers from India, who reportedly work for a cybersecurity company. However, because Malware Hunter Team has found it being exploited in the wild, either these developers or other nefarious users have decided to use the malware for their own cybercriminal means.
I was able to find the site, which uses the Heroku platform-as-a-service (PaaS), the same serice used to host control panels for the spyware:
I went ahead and checked the relationships this domain has on VirusTotal out of curiosity:
What I found was a number of antivirus detections for active use of XploitSPY in the wild, 10 in total. Along with the hits for XploitSPY was another Android malware called “instaPlus.apk” and “InstaPlusSettings.apk”. This was more than likely those using the spyware had renamed it and were masquerading as a fake premium version of Instagram. On the developer’s GitHub was a Instagram credential harvesting tool as well:
Some of XploitSPY’s features includes:
Other security researchers noted that XploitSPY appears to be a fork of another Android malware called L3MON, just with upgraded features for further data capture and active spying capabilities.
Here’s a view of what the control panels may look like for XploitSPY:
The group behind XploitSPY are calling themselves XploitWizer and claim to be ethical hackers on their GitHub account and that XploitSPY is for an “educational purpose” only:
However, giving away what appears to be a very powerful Android spyware, which has fairly low detection ratings on VirusTotal, seems to be a reckless thing to do. Once released to the public, the developers are unable to control what those who download XploitSPY do. It is a kit which is readily made out of the box, which also comes with detailed instrustions on how to help you remain concealed from anyone who may want to find you using it with a VPS.These actions makes many in the InfoSec community wonder how ethical these ethical hackers are.
Organisations need to make sure company devices are setup with reinforced security policies to defend against these types of threats, especially during the COVID-19 lockdown where users are on home WiFi and mobile data, away from corporate detection systems.
I have collected and attached IOCs to my OTX Alienvault account here.
Special thanks to Lukas Stefanko of ESET and Malware Hunter Team who have been doing some awesome work spotting these Android spyware and banking Trojans in the wild, quickly analysing, and reporting them publicly. We salute you.
References:
https://github.com/XploitWizer/XploitSPY
https://github.com/D3VL/L3MON
https://twitter.com/LukasStefanko/status/1249810055924498432
https://twitter.com/malwrhunterteam/status/1249768400806653952