“PREDATOR” malware enabling voice recording and data theft on Android devices

Share post:

Cisco Talos researchers have detected “PREDATOR” smartphone malware produced by Cytrox. This virus is capable of discreetly recording voice calls, capturing adjacent audio, extracting data from messaging apps like as Signal and WhatsApp, and even hiding or disabling programs after a device reset.

Talos discovered that the malware has a “ALIEN” component, which was previously assumed to be inconsequential but is really critical to the virus’s composition. To avoid detection and analysis, spyware developers such as Cytrox and NSO Group employ innovative tactics such as zero-click and one-click attacks. Cytrox created a one-click vulnerability for deploying the “PREDATOR” malware. These attack sequences make detecting and defending against spyware challenging.

Talos analyzed the PREDATOR malware and discovered that it utilizes five vulnerabilities (CVE-2021-37973, CVE-2021-37976, CVE-2021-38000, CVE-2021-38003, and CVE-2021-1048) to bypass security features on Android devices. These vulnerabilities exploit weaknesses in Google Chrome, Linux, and Android, giving the malware control over the targeted devices.

ALIEN, working in conjunction with PREDATOR, plays a significant role in evading Android’s security measures, including SELinux restrictions. SELinux is responsible for protecting access to communication channels called sockets, which malware often misuses. By loading ALIEN into Zygote64, the memory space for launching apps on Android, the spyware gains greater control and management over stolen data.

The sources for this piece include an article in ArsTechnica.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways