Article Details

Scrape Timestamp (UTC): 2023-11-10 05:10:37.273

Source: https://thehackernews.com/2023/11/stealthy-kamran-spyware-targeting-urdu.html

Original Article Text

Click to Toggle View

Stealthy Kamran Spyware Targeting Urdu-speaking Users in Gilgit-Baltistan. Urdu-speaking readers of a regional news website that caters to the Gilgit-Baltistan region have likely emerged as a target of a watering hole attack designed to deliver a previously undocumented Android spyware dubbed Kamran. The campaign, ESET has discovered, leverages Hunza News (urdu.hunzanews[.]net), which, when opened on a mobile device, prompts visitors of the Urdu version to install its Android app directly hosted on the website. The app, however, incorporates malicious espionage capabilities, with the attack compromising at least 20 mobile devices to date. It has been available on the website since sometime between January 7, and March 21, 2023, around when massive protests were held in the region over land rights, taxation, and extensive power cuts. The malware, activated upon package installation, requests for intrusive permissions, allowing it to harvest sensitive information from the devices. This includes contacts, call logs, calendar events, location information, files, SMS messages, photos, list of installed apps, and device metadata. The collected data is subsequently uploaded to a command-and-control (C2) server hosted on Firebase. Kamran lacks remote control capabilities and is also simplistic by design, carrying out its exfiltration activities only when the victim opens the app and lacking in provisions to keep track of the data that has already been transmitted. This means that it repeatedly sends the same information, along with any new data meeting its search criteria, to the C2 server. Kamran has yet to be attributed to any known threat actor or group. "As this malicious app has never been offered through the Google Play store and is downloaded from an unidentified source referred to as unknown by Google, to install this app, the user is requested to enable the option to install apps from unknown sources," security researcher Lukáš Štefanko said.

Daily Brief Summary

MALWARE // Stealth Android Spyware "Kamran" Targets Urdu Speakers in Gilgit-Baltistan

A covert cyber espionage campaign targeting Urdu-speaking users has been identified by ESET, involving a spyware named Kamran.

The malware was disguised as a legitimate Android app offered by Hunza News, a regional news website serving the Gilgit-Baltistan area.

The app contained espionage features and has compromised at least 20 devices, collecting a wide range of personal data.

Users visited the website and were prompted to download the app directly, bypassing the security of the Google Play store.

The spyware requests extensive permissions to exfiltrate sensitive information, including contact details, call logs, messages, location, and more, to a Firebase server.

The design of Kamran spyware is relatively simple, with no remote control capabilities, and it repeatedly uploads the same data to the control server.

The threat actor behind Kamran has not been identified, and the app has only been distributed through the website, not via any official app stores.