Pro-India hackers use Android spyware to spy on Pakistani military
By
12:12 PM
This week a report has revealed details on two Android spyware strains leveraged by state-sponsored threat actors during the India-Pakistan conflict.
The malware strains named
SunBird have been delivered as fake Android apps (APKs) by the
Confucius advanced persistent threat group (APT), a pro-India state-sponsored operation known to spy on Pakistani and South Asian targets, since at least 2013.
Although Confucius has created Windows malware in the past, the group has extended its capabilities to mobile malware since 2017 when the spying app ChatSpy came into existence.
The apps used by the group contain advanced capabilities including taking photos from the camera, requesting elevated privileges, scraping WhatsApp messages, and uploading all this information to the servers of the APT group.
Bill Gates, while motivated to help fight climate change, has also long been trying to make a success of his nuclear technology company Terra Power. The climate emergency presents him with the perfect opportunity to promote this, and especially, to get tax–payer funding to do it, as he suggests in his new book.
Elon Musk and Bill Gates: beware of gurus toting solutions to climate change
Elon Musk has grand plans to save the world. Bill Gates has just published his book ”How To Avoid a Climate Disaster”. They both envisage tax-payer funding for their solutions. But beware of gurus toting the solution to the planet’s crisis.
Researchers at the security firm Lookout have identified two new Android spyware tools used for cyberespionage campaigns in South Asia which they say are linked to
Lookout, a San Franciso-based security firm, recently reported that it has identified two new Android spyware tools designed for cyber espionage campaigns
The two malware families have sophisticated capabilities to exfiltrate SMS messages, WhatsApp messaging content and geolocation.
Researchers have uncovered two novel Android surveillanceware families being used by an advanced persistent threat (APT) group to target military, nuclear and election entities in Pakistan and Kashmir.
The two malware families, which researchers call “Hornbill” and “SunBird,” have sophisticated capabilities to exfiltrate SMS messages, encrypted messaging app content and geolocation, as well as other types of sensitive information.
Researchers first saw Hornbill as early as May 2018, with newer samples of the malware emerging on December 2020. They said the first Sunbird sample dates back to 2017 and was last seen active on December 2019.