Threat groups relying on trojanized apps to spread surveillanceware

Apurva Kumar shows how Monokle is spreading its surveillanceware

Threat groups are increasingly relying on trojanized apps posing as legitimate versions. Instead of getting the app you’re looking for, your device gets a dose of surveillanceware. In an interview with Threatpost, Apurva Kumar, a security intelligence engineer at Lookout, shared how surveillanceware group Monokle is already employing this tactic.

Advertisement - Article continues below

Kumar first spoke about Monokle at this year’s RSA Conference. During the session, he gave attendees an inside look at the highly targeted Monokle surveillanceware and tied it to nation-states.

Kumar explained in the Threatpost interview, “We found after quite a bit of investigation, and after looking at Monokle for a couple of times, we found that the developer of Monokle is almost certainly a Russian defense contractor by the name of Special Technology Center or STC. And this developer appears to have a very good or very advanced Android development pipeline, they are most likely producing a number of different applications, Android apps, both on the defensive side and the offensive side. So they produce some defensive security solutions that are like basically an antivirus, as well, as a surveillanceware which we found called Monokle.”

Kumar continued, detailing how Monokle distributes its surveillanceware. By mimicking well-known applications, such as Skype or Signal, Monokle convinces users to trust the trojanized app enough to install it. Once installed, Monokle distributes malware across the unsuspecting users’ devices.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

While it’s concerning that threat groups are using booby-trapped versions of popular apps to distribute surveillanceware, Kumar noted, “Threats are starting to move away from [the] simple installation of applications and starting to move more onto the device and device exploitation side. So definitely, as always, there will always be an increase in sophistication and complexity of these actors as they try to find new and novel ways of getting onto their targets’ device.”

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/security/30081/what-is-a-trojan-virus
Security

What is a Trojan?

24 Apr 2020
Visit/security/malware/355093/evasive-malware-threats-are-surging
malware

Evasive malware threats doubled in 2019

24 Mar 2020
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

2 Mar 2020
Visit/antivirus/28144/best-antivirus
antivirus

Best antivirus for Windows 10

3 Sep 2019

Most Popular

Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

5 May 2020
Visit/mobile/5g/355712/nokia-5g-speed-record
5G

Nokia breaks 5G record with speeds nearing 5Gbps

20 May 2020
Visit/cloud/cloud-computing/355742/microsoft-launches-public-cloud-service-for-health-care
cloud computing

Microsoft launches public cloud service for health care

21 May 2020