Endpoint/Device Security, Application security, Threat Management
Russia accuses US, Apple of foul play while Kaspersky uncovers mobile malware campaign

The Russian embassy in Berlin is seen. The Russian government claims a mobile malware campaign uncovered by Kaspersky was directed by the U.S. government and also targeted their embassy staff and a range of other countries. (Credit: Terroa via Getty Images)
Kaspersky researchers say they have uncovered a mobile malware campaign targeting their researchers the same day that Russian intelligence services referenced the report to accuse the U.S. government and Apple of collaborating to place backdoors in Apple mobile phones.In a post published June 1, a quartet of Kaspersky researchers say the campaign was discovered while monitoring its corporate network W-Fi traffic for mobile devices. While iPhones are notoriously difficult to forensically examine, the company stores offline backups of their devices that allow them to partially examine the filesystem, user data and databases."Basically, the phone was connecting to the servers getting the attachment or iMessage, and then the next minute the phone started connecting to some weird suspicious domain. So we started looking more into that and ... we were able to recover this APT platform that was being delivered to the devices," Igor Kuznetsov, head of EEMEA at Kaspersky's Global Research and Analysis Team, told SC Media Thursday.That effort revealed “specific artifacts that indicate” a number of company phones were infected with “zero-click” mobile malware. According to Kaspersky, a targeted device using iOS operating system software will receive an iMessage with an attachment containing the malware. That message automatically triggers a vulnerability that allows for remote code execution and pings command-and-control servers for additional malware payloads that facilitate privilege escalation and other capabilities, before deleting the message itself. According to Kuznetsov, the first exploit provides initial access and compromise, while the second gives an attacker kernel-level access to the device. The individuals targeted were not just security researchers but also managers and other top executives at the firm."It gains complete root access over the phone — basically all the sensors, the microphone, the screen, all the data on the phone — and it starts getting the commands from the server and doing whatever the operator wants," he said.Donncha Cearhaill, head of security lab at Amnesty Tech, said Kaspersky used their mobile verification tool to discover the attack and posted a list of indicators of compromise associated with the campaign on GitHub.Initially, Kaspersky researchers thought they may have been targeted with Pegasus, a notorious piece of mobile phone malware created by NSO Group, but Kuznetsov said that apart from the zero-click technique used to gain initial access, there is no intersection between the indicators of compromise associated with Pegasus and the mobile malware campaign they discovered.Kaspersky is still investigating the final payload, but the company said they believe the activity has been going on for years.“The timelines of multiple devices indicate that they may be reinfected after rebooting. The oldest traces of infection that we discovered happened in 2019. As of the time of writing in June 2023, the attack is ongoing, and the most recent version of the devices successfully targeted is iOS 15.7,” the researchers wrote.
An In-Depth Guide to Application Security
Get essential knowledge and practical strategies to fortify your applications.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds