Around January 2020, we discovered a watering hole attack against
iOS users in Hong Kong that our team named "Operation Poisoned News". The name came from the tactics employed for targeting users, consisting of designing web pages with multiple iframes to load an
iOS exploit and disguising them as local news pages. Links to the crafted web pages were posted on multiple popular forums in Hong Kong and people accessing those links were infected if they had an unpatched
iPhone device.
The
iOS exploit was designed to exploit
iOS versions between 12.1 and 12.2 on several
iPhone models up to
iPhone X. Once users have been compromised a full spying malware is installed on their phones.
The
iOS malware, which we dubbed lightSpy, is a modular backdoor which allows the attacker to remotely execute shell command and manipulate files on the infected device. It’s also implemented with several functionalities for exfiltrating data from the infected device including:
- Hardware information
- Contacts
- Keychain
- SMS messages
- Phone call history
- GPS location
- Connected Wi-Fi history
- Browser history of Safari and Chrome
As well as reporting the surrounding environment of device by:
- Scanning local network IP address
- Scanning available Wi-Fi networks
There are also modules specifically designed to exfiltrate data from popular messenger applications including
QQ,
WeChat and
Telegram.
The lightSpy malware has a modular design with multiple capabilities including:
- Modules update
- Remote command dispatch per module
- Complete shell command module.
While we were analysing the payload delivered using the
iOS exploit, we noticed a decoded configuration file pointing to a URL with the
Android name on it. This hints that an
Android version of lightSpy related to this campaign probably existed. After further hunting we found that the attackers also targeted
Android devices during 2019. We found the campaign posted URL links to a malicious APK file on public Hong Kongese
Telegram channels. The message was disguised as promoting a legitimate application to trick people installing the malware on their
Android devices. The malware can also exfiltrate device information, contacts and SMS messages. We dubbed the
Android malware dmsSpy.
In this presentation we will discuss details of the Operation Poisoned News campaign, and present an analysis of the malware spying on both
Android and
iOS iPhone devices (lightSpy, dmsSpy).