
Cybersecurity researchers have discovered an upgraded version of the LightSpy implant, a type of modular spyware that can extract information from devices running Windows and macOS, particularly targeting social media platforms such as Facebook and Instagram. This spyware was first identified in 2020, with its initial targets being users in Hong Kong.
The range of data LightSpy can collect is extensive, including Wi-Fi configurations, screenshots, location data, sound recordings, photos, browser histories, contacts, call logs, SMS messages, and information from various applications like LINE, WeChat, and WhatsApp. Recently, ThreatFabric reported that the malware has enhanced its capabilities to not only collect data but also to disrupt the operation of the infected devices, with the number of supported plugins growing from 12 to 28.
Further analysis has established connections between LightSpy and another Android malware known as DragonEgg, emphasizing the cross-platform threat it poses. Hunt.io’s recent evaluation of the malware’s command-and-control (C2) setup revealed over 100 commands applicable across Android, iOS, Windows, macOS, and Linux devices.
Notably, this new command set indicates a shift from mere data collection to a broader control scope, including the management of data transmission and plugin version updates. LightSpy has introduced commands that allow it to target database files of the Facebook and Instagram applications for sensitive data extraction from Android systems. Interestingly, it has also removed certain destructive iOS plugins that could affect the host.
In addition, 15 new plugins have been designed for Windows that focus on various surveillance functions, including keylogging, audio recording, and USB interactions. Within its administration panel, an endpoint was located allowing remotely logged-in users to control compromised mobile devices, though it remains unclear if this is a new feature or an enhancement of existing functionalities.
The unveiling of this spyware aligns with another report from Cyfirma, which detailed Android malware named SpyLend that masquerades as a legitimate financial application but is actually involved in predatory lending and extortion targeting Indian users. This app capitalizes on user location to display unauthorized loan offers through its interface, misleading users and utilizing deceptive practices to gather sensitive data.
Moreover, the evolving tactics also include a malware called FinStealer, which imitates real banking apps to extract user credentials and facilitate unauthorized financial transactions through phishing and social engineering. This makes it increasingly difficult for users to discern legitimate applications from malicious ones.
In summary, as cyber threats become more intricate and widespread, users are advised to remain vigilant and employ robust security measures to protect against such evolving threats.
Welcome to DediRock, your trusted partner in high-performance hosting solutions. At DediRock, we specialize in providing dedicated servers, VPS hosting, and cloud services tailored to meet the unique needs of businesses and individuals alike. Our mission is to deliver reliable, scalable, and secure hosting solutions that empower our clients to achieve their digital goals. With a commitment to exceptional customer support, cutting-edge technology, and robust infrastructure, DediRock stands out as a leader in the hosting industry. Join us and experience the difference that dedicated service and unwavering reliability can make for your online presence. Launch our website.