APT Hackers Distributed Android Trojan via Syrian e-Government Portal

APT Hackers
Share It On:

26th July 2021, Kathmandu

An advanced persistent threat (APT) actor has been tracked in an incipient campaign deploying Android malware via the Syrian e-Regime Web Portal, denoting an upgraded arsenal designed to compromise victims.

“To the best of our erudition, this is the first time that the group has been publicly optically canvassed utilizing malevolent Android applications as a component of its attacks,” Trend Micro researchers Zhengyu Dong, Fyodor Yarochkin, and Steven Du verbalized in a technical inscribe-up published Wednesday.

StrongPity, withal codenamed Promethium by Microsoft, is believed to have been active since 2012 and has typically fixated on targets across Turkey and Syria. In June 2020, the espionage threat actor was connected to a wave of activities that banked on watering aperture attacks and tampered installers, which abuse the popularity of legitimate applications, to infect targets with malware.

“Promethium has been resilient over the years,” Cisco Talos disclosed last year. “Its campaigns have been exposed an abundance of times, but that was not enough to make the actors behind it make them stop. The fact that the group does not forbear launching incipient campaigns even after being exposed shows their resolve to accomplish their mission.”

The latest operation is no different in that it underscores the threat actor’s propensity towards repackaging benign applications into trojanized variants to facilitate the assailants.

The malware, masquerading as the Syrian e-Gov Android application, is verbalized to have been engendered in May 2021, with the app’s manifest file (“AndroidManifest.xml”) modified to explicitly request supplemental sanctions on the phone, including the faculty to read contacts, inscribe to external storage, keep the contrivance aroused, access information about cellular and Wi-Fi networks, precise location, and even sanction the app to have itself commenced as anon as the system has culminated booting.

Supplementally, the malignant app is designed to perform long-running tasks in the background and trigger a request to a remote command-and-control (C2) server, which responds back with an encrypted payload containing a settings file that sanctions the “malware to transmute its deportment according to the configuration” and update its C2 server address.

Last but not least, the “highly modular” implant has the capacity to hoover data stored on the infected contrivance, such as contacts, Word and Excel documents, PDFs, images, security keys, and files preserved utilizing Dagesh Pro Word Processor (.DGS), among others, all of which are exfiltrated back to the C2 server.

Despite no kenned public reports of StrongPity utilizing malevolent Android applications in their assailants, Trend Micro’s attribution to the adversary stems from the utilization of a C2 server that has antecedently been utilized in intrusions linked to the hacking group, eminently a malware campaign documented by AT&T’s Alien Labs in July 2019 that leveraged tainted versions of the WinBox router management software, WinRAR, and other trusted utilities to breach targets.

“We believe that the threat actor is exploring multiple ways of distributing the applications to potential victims, such as utilizing fake apps and utilizing compromised websites as watering apertures to chicane users into installing malevolent applications,” the researchers verbalized.

“Typically, these websites would require its users to download the applications directly onto their contrivances. In order to do so, these users would be required to enable the installation of the applications from ‘unknown sources’ on their contrivances. This bypasses the ‘trust chain of the Android ecosystem and makes it more facile for an assailant to distribute supplemental malignant components,” they integrated.


Share It On:

Recent Posts

Lumbini Lions Jersey Unveiled: A Tribute to Buddhist Heritage

Lumbini Lions Jersey Unveiled: A Tribute to Buddhist Heritage

Share It On:17th November 2024, Kathmandu The Lumbini Lions Club has unveiled their jersey for the upcoming Nepal Premier League

Barbadian Fast Bowler Ramon Simmonds Joins Lumbini Lions for NPL 2024

Barbadian Fast Bowler Ramon Simmonds Joins Lumbini Lions for NPL

Share It On:17th November 2024, Kathmandu Lumbini Lions have added firepower to their bowling attack for the upcoming Nepal Premier

Xiaomi Unveils New High-Capacity Fast-Charging Power Banks in Nepal

Xiaomi Unveils New High-Capacity Fast-Charging Power Banks in Nepal

Share It On:17th November 2024, Kathmandu Xiaomi, a global leader in consumer electronics and smart manufacturing, has unveiled three new

.NET Conf 2024 AspnetCommunity Kathmandu Nepal Successfully Concludes With 130+ Attendees

.NET Conf 2024 AspnetCommunity Kathmandu Nepal Successfully Concludes With 130+

Share It On:17th November 2024, Kathmandu The ASP.NET Community has successfully hosted “.NET Conf 2024 AspnetCommunity Kathmandu Nepal” at Kantipur

Gen AI in Focus 2024: November Breakthroughs, Industry Stats & Election Impact

Gen AI in Focus 2024: November Breakthroughs, Industry Stats &

Share It On:17th November 2024, Kathmandu Generative AI is revolutionizing industries, with the market expected to surge from $40 billion

Shocking T-Mobile Breach: Chinese Hackers Have Access to Your Private Data

Shocking T-Mobile Breach: Chinese Hackers Have Access to Your Private

Share It On:17th November 2024, Kathmandu T-Mobile’s network has been targeted in a major Chinese cyber-espionage campaign that has infiltrated