CyberSecurity SEE

LianSpy Targets Android Users to Steal Sensitive Data

LianSpy Targets Android Users to Steal Sensitive Data

Cybersecurity experts recently discovered a highly sophisticated Android spyware known as LianSpy, designed to target users and steal sensitive data. This spyware is equipped with advanced evasion techniques, posing a significant threat to Android device users globally.

LianSpy begins its operation by checking if it runs as a system app, granting it automatic permissions. In cases where it does not, it requests permissions for various functions such as screen overlay, notifications, background activity, contacts, call logs, and more. Once authorized, it ensures it is not running in a debugging environment.

According to a report by SecureList, LianSpy configures itself with predefined values, storing this information locally using SharedPreferences, a common app data storage mechanism. This configuration remains intact even after device reboots, using integer keys linked to specific spyware settings. Key features of LianSpy include collecting lists of installed applications, call logs, contacts, taking screenshots, capturing screens via the media projection API, and exfiltrating data at specified intervals.

One of the unique aspects of LianSpy is its ability to evade detection using various techniques. It disguises itself as a legitimate application or system service, such as the Alipay app, to blend in with other apps on the device. Additionally, it bypasses Android 12’s privacy indicators, which usually display icons in the status bar when sensitive data is accessed. LianSpy achieves this by manipulating the Android secure setting parameter icon_blacklist, preventing notification icons from appearing.

Moreover, LianSpy conceals notifications from background services by leveraging the NotificationListenerService, which handles status bar notifications and can suppress them, allowing the spyware to operate discreetly without alerting the user.

The stolen data is encrypted and stored in an SQL table named Con001, including the type of record and its SHA-256 hash. LianSpy uses a secure pseudorandom number generator (PRNG) to generate an AES key, encrypting it with a hardcoded public RSA key. Data exfiltration is carried out using legitimate cloud services like Yandex Disk, making it challenging to attribute the malicious activity to a specific source.

Evidence suggests that LianSpy primarily targets Russian users, as indicated by key phrases used to filter notifications and default configurations tailored to messaging apps popular in Russia. Kaspersky Security Network (KSN) telemetry confirms that Russian users have been victims of LianSpy attacks.

Overall, LianSpy represents a significant advancement in Android spyware, with its sophisticated evasion techniques and robust encryption methods. To protect against such threats, users are advised to stay vigilant and keep their devices secure with updated security measures.

In conclusion, the emergence of LianSpy underscores the importance of cybersecurity awareness and proactive measures to safeguard personal and sensitive information from sophisticated threats in the digital landscape. Users must prioritize security practices and stay informed about potential risks to mitigate the threat posed by malicious actors and spyware attacks targeting Android devices.

Source link

Exit mobile version