Dark Caracal
Dark Caracal is a spyware campaign[1][2] that has been conducted by an unknown group of hackers since at least 2012.[3] The campaign was discovered by the Electronic Frontier Foundation and the mobile security firm Lookout,[1] who published their findings on January 18, 2018.[2] The campaign has mainly used phishing attacks (and in some cases physical access to victims systems[2]) in order to install malicious Android applications, including ones that imitate the look and feel of popular instant messaging applications, on victims systems to gain full control over the devices.[3] No evidence was found that iPhone users have been targeted, and according to Google, none of the malicious applications were found on the Google Play Store.[3] The data allegedly stolen includes documents, call records, text messages, audio recordings, secure messaging client content, browsing history, contact information, photos, location data, and other information that allows the group to identify their targets and have a look at their personal lives.[citation needed] The component used to monitor Android devices is known as Pallas; the component used to monitor Windows devices is a variant of the Bandook trojan.[4]
The campaign is suspected to be state-sponsored[2] and linked to the Lebanese government's General Directorate of General Security.[4][5][2] According to Reuters, "the researchers found technical evidence linking servers used to control the attacks to a GDGS office in Beirut by locating wi-fi networks and internet protocol address in or near the building."[3] The researchers have said that they are not certain "whether the evidence proves GDGS is responsible or is the work of a rogue employee."[3] The report was denied by Major General Abbas Ibrahim.[3]
The group continues to be active in various countries, as of early 2023.[6]
References
- ↑ 1.0 1.1 Newman, Lily Hay (20 January 2018). "Security News This Week: Hacking Group's Mobile Malware Spies on Thousands Worldwide". Wired (Condé Nast). https://www.wired.com/story/hacking-groups-mobile-malware-spies-on-thousands-worldwide/. Retrieved 21 January 2018.
- ↑ 2.0 2.1 2.2 2.3 2.4 Satter, Raphael (2018-01-18). "Report links hacking campaign to Lebanese security agency" (in en-US). Washington Post. ISSN 0190-8286. https://www.washingtonpost.com/business/technology/researchers-hacking-campaign-linked-to-lebanese-spy-agency/2018/01/18/1fb36142-fc62-11e7-9b5d-bbf0da31214d_story.html.
- ↑ 3.0 3.1 3.2 3.3 3.4 3.5 Auchard, Eric (18 January 2018). "Lebanese security agency turns smartphone into selfie spycam: researchers". https://www.reuters.com/article/us-lebanon-cyber/lebanese-security-agency-turns-smartphone-into-selfie-spycam-researchers-idUSKBN1F726S. Retrieved 23 January 2018.
- ↑ 4.0 4.1 Thomson, Iain (18 January 2018). "Someone is touting a mobile, PC spyware platform called Dark Caracal to governments" (in en). The Register. https://www.theregister.co.uk/2018/01/18/dark_caracal_malware/.
- ↑ Brandom, Russell (January 18, 2018). "Researchers have discovered a new kind of government spyware for hire". The Verge. https://www.theverge.com/2018/1/18/16905464/spyware-lebanon-government-research-dark-caracal-gdgs.
- ↑ Lorenzo Franceschi-Bicchierai (2023-02-10). "Digital rights defenders infiltrate alleged mercenary hacking group; An EFF researcher monitored the activities of Dark Caracal for months". TechCrunch. https://techcrunch.com/2023/02/10/digital-rights-defenders-infiltrate-alleged-mercenary-hacking-group/.
External links
- "Dark Caracal; Cyber-espionage at a Global Scale", technical report by Lookout and the Electronic Frontier Foundation
Original source: https://en.wikipedia.org/wiki/Dark Caracal.
Read more |