Home Malware Programs Mac Malware LightSpy

LightSpy

Posted: March 27, 2020

LightSpy is a newly discovered spyware implant that affects iOS versions from 12.01 to 12.2. In addition to this, the implant may be able to work on the previous generation 11.03 iOS version. IOS - compatible malware is a relatively rare sight, and the LightSpy appears to be a piece of software that has been developed by highly-skilled cybercriminals. Experts who identified the LightSpy payload and analyzed its infrastructure, have determined that this threat is likely to originate from China. Still, its development cannot be attributed to a specific APT group operating from the region. However, experts suspect that it might be linked to Spring Dragon, also known as Lotus Blossom.

The LightSpy Spyware Kit is Used against Hong Kong Activists

The scope of the LightSpy campaign appears to be very limited – the attackers use propagation techniques that target Hong Kong protesters exclusively, another confirmation that the threat is likely to be used by a Chinese-based cybercrime group.

The attackers use a wide range of techniques to reach their intended demographic:

  • Direct messaging via email and various social media networks.
  • Phishing emails.
  • Fake messages on online forum boards.
  • Posts on Instagram and various Telegram channels.

The perpetrators host the corrupted payload and exploit kit on custom-made Web pages that are hosted on various domains such as Appledaily.googlephoto.vip, facebooktoday.cc, news2.hkrevolution.club, googlephoto.vip, and others. The first domain on the list, Appledaily.googlephoot.vip, hosts a fake page designed to look like the website of 'Apple Daily,' a newspaper popular in Hong Kong.

LightSpy Provides its Operators with Access to WeChat, QQ and Text Messages History

If the payload is planted successfully, the infected device would connect to one of the pre-defined control servers and wait for commands to execute. The LightSpy implant supports a wide range of commands that would enable its operator to exfiltrate all kinds of sensitive information from iOS devices:

  • Execute remote commands.
  • Extract text messages, call history, and contacts.
  • Manage text messages.
  • Obtain information about WeChat accounts, contacts, messages, groups and shared files.
  • Use the GPS to obtain location information.
  • Upload file to the infected device.
  • Download files from the infected device to the control server.
  • Obtain information about QQ accounts, contacts, messages, groups and shared files.
  • Extract WiFi connection history, as well as information about WiFi networks available nearby.
  • Receive a list of installed apps and running processes.

LightSpy is not the first piece of malware to be used against the Hong Kong protesters, but it is the first one to target iOS devices exclusively.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to LightSpy may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

* See Free Trial offer below. EULA and Privacy/Cookie Policy.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Related Posts

Loading...
Spywareremove.com uses cookies to provide you with a better browsing experience and analyze how users navigate and utilize the Site. By using this Site or clicking on "OK", you consent to the use of cookies. Learn more.