An Italy-based firm’s hacking tools were used to spy on Apple and Android smartphones in Italy and Kazakhstan, Google said Thursday, casting a light on a “flourishing” spyware industry.
Google’s threat analysis team said spyware made by RCS Lab targeted the phones using a combination of tactics including unusual “drive-by downloads” that happen without victims being aware.
Concerns over spyware were fueled by media outlets reporting last year that Israeli firm NSO’s Pegasus tools were used by governments to surveil opponents, activists and journalists.
Apple and Android phones hacked by Italian spyware, says Google – Report claims Milan-based RCS Lab developed tools to spy on private messages and contacts of targeted devices https://t.co/vH4Gj6wICs pic.twitter.com/hxJb50lODq
— George Roussos (@baphometx) June 23, 2022
“They claim to only sell to customers with a legitimate use for surveillance ware, such as intelligence and law enforcement agencies,” mobile cybersecurity specialist Lookout said of companies like NSO and RCS.
“In reality, such tools have often been abused under the guise of national security to spy on business executives, human rights activists, journalists, academics and government officials,” Lookout added.
Google’s report said the RCS spyware it uncovered, and which was dubbed “Hermit”, is the same one that Lookout reported on previously.
Lookout researchers said that in April they found Hermit being used by the government of Kazakhstan inside its borders to spy on smartphones, just months after anti-government protests in that country were suppressed.
“Like many spyware vendors, not much is known about RCS Lab and its clientele,” Lookout said. “But based on the information we do have, it has a considerable international presence.”
Growing spyware industry
Evidence suggests Hermit was used in a predominantly Kurdish region of Syria, the mobile security company said.
Analysis of Hermit showed that it can be employed to gain control of smartphones, recording audio, redirecting calls, and collecting data such as contacts, messages, photos and location, Lookout researchers said.
Google and Lookout noted the spyware spreads by getting people to click on links in messages sent to targets.
“In some cases, we believe the actors worked with the target’s ISP (internet service provider) to disable the target’s mobile data connectivity,” Google said.
“Once disabled, the attacker would send a malicious link via SMS asking the target to install an application to recover their data connectivity.”
When not masquerading as a mobile internet service provider, the cyber spies would send links pretending to be from phone makers or messaging applications to trick people into clicking, researchers said.
“Hermit tricks users by serving up the legitimate webpages of the brands it impersonates as it kickstarts malicious activities in the background,” Lookout researchers said.
Google said it has warned Android users targeted by the spyware and ramped up software defenses. Apple told AFP it has taken steps to protect iPhone users.
Google’s threat team is tracking more than 30 companies that sell surveillance capabilities to governments, according to the Alphabet-owned tech titan.
Read more: Top 10 Techniques to Secure Privacy Online
“The commercial spyware industry is thriving and growing at a significant rate,” Google said.
AFP with additional input by GVS News Desk