Sophisticated, ongoing campaign tied to OceanLotus APT group
WOBURN, Mass.–(BUSINESS WIRE)–Kaspersky researchers detected a sophisticated malicious campaign targeting users of Android devices, which can be attributed with medium confidence to the OceanLotus advanced persistent threat actor. Dubbed PhantomLance, the campaign has been active since at least 2015 and is still ongoing, featuring multiple versions of a complex spyware – software created to gather victims’ data – and smart distribution tactics, including distribution via dozens of applications on the Google Play official market.
In July 2019, third-party security researchers reported a new spyware sample found on Google Play. The report attracted Kaspersky’s attention due to its unexpected features – its sophistication level and behavior was very different from the common Trojans usually uploaded to official app stores. Kaspersky researchers were able to find another very similar sample of this malware on Google Play. Usually, if malware creators manage to upload a malicious app in the legitimate app store, they invest considerable resources into promoting the application to increase the number of installations and thus increase the number of victims. This wasn’t the case with these newly-discovered malicious apps. It looked like the operators behind them were not interested in mass spread. For the researchers, this was a hint of targeted APT activity. Additional research enabled the discovery of several versions of this malware with dozens of samples, connected by multiple code similarities.
The functionality of all the samples was similar – the main purpose of the spyware was to gather information. While the basic functionality was not very broad, and included geolocation, call logs, contact access and SMS access, the application could also gather a list of installed applications, as well as device information, such as the model and OS version. Furthermore, the threat actor was able to download and execute various malicious payloads, and thus adapt the payload that would be suitable to the specific device environment, such as the Android version and installed apps. This way, the actor was able to avoid overloading the application with unnecessary features and at the same time gather the desired information.
Further research indicated that PhantomLance was mainly distributed on various platforms and marketplaces, including, but not limited to, Google Play and APKpure. To make the applications seem legitimate, in almost every case of malware deployment, the threat actors tried to build a fake developer profile by creating an associated Github account. In order to evade filtering mechanisms employed by marketplaces, the first versions of the application uploaded by the threat actor to marketplaces did not contain any malicious payloads. However, with later updates, applications received both malicious payloads and a code to drop and execute these payloads.
According to Kaspersky Security Network, since 2016, around 300 infection attempts were observed on Android devices in countries including India, Vietnam, Bangladesh and Indonesia. While detection statistics included collateral infections, Vietnam stood out as one of the top countries by number of attempted attacks; some malicious applications used in the campaign were also made exclusively in Vietnamese.
Using Kaspersky’s malware attribution engine – an internal tool to find similarities between different pieces of malicious code – the researchers were able to determine that PhantomLance payloads were at least 20% similar to those from one of the older Android campaigns associated with OceanLotus, an actor that has been in operation since at least 2013 and whose targets are mostly located in South East Asia. Moreover, several important overlaps were found with previously reported activities of OceanLotus on Windows and MacOS. Therefore, Kaspersky researchers believe the PhantomLance campaign can be tied to OceanLotus with medium confidence.
Kaspersky reported all discovered samples to the owners of the legitimate app stores. Google Play has confirmed that they have taken down the applications.
“This campaign is an outstanding example of how advanced threat actors are moving further into deeper waters and becoming harder to find,” said Alexey Firsh, security researcher at Kaspersky’s GReAT. “PhantomLance has been going on for over five years and the threat actors managed to bypass the app stores’ filters several times, using advanced techniques to achieve their goals. We can also see that the use of mobile platforms as a primary infection point is becoming more popular, with more and more actors advancing in this area. These developments underline the importance of continuous improvement of threat intelligence and supporting services, which could help in tracking threat actors and finding overlaps between various campaigns.”
The full report of the PhantomLance campaign is available on Securelist.
To avoid falling victim to targeted attacks on organizations or persons, Kaspersky recommends the following:
For consumers:
For businesses:
About Kaspersky
Kaspersky is a global cybersecurity company founded in 1997. Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at usa.kaspersky.com.
Contacts
Sawyer Van Horn
sawyer.vanhorn@Kaspersky.com
(781) 503-1866
HONG KONG SAR – Media OutReach Newswire - 6 November 2024 - At the "2024…
KUALA LUMPUR, MALAYSIA - Media OutReach Newswire - 6 November 2024 - On the 28th…
SEOUL, SOUTH KOREA - Media OutReach Newswire - 6 November 2024 - On World Pathology…
KUALA LUMPUR, MALAYSIA - Media OutReach Newswire - 31 October 2024 - E-brokerage is a…
Strategic alliance poised to create new growth avenues in Thailand, Japan, and beyond. BANGKOK, THAILAND…
Leonteq announced today that it has enabled its Shari’a-compliant structured product offering on its digital…