mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 14:57:18 +00:00
add Skygofree android spyware
This commit is contained in:
parent
27805ca768
commit
56fe9eb63c
2 changed files with 23 additions and 4 deletions
|
@ -4300,9 +4300,19 @@
|
|||
]
|
||||
},
|
||||
"uuid": "53e2e7e8-70a8-11e8-b0f8-33fcf651adaf"
|
||||
},
|
||||
{
|
||||
"value": "Skygofree",
|
||||
"description": "At the beginning of October 2017, we discovered new Android spyware with several features previously unseen in the wild. In the course of further research, we found a number of related samples that point to a long-term development process. We believe the initial versions of this malware were created at least three years ago – at the end of 2014. Since then, the implant’s functionality has been improving and remarkable new features implemented, such as the ability to record audio surroundings via the microphone when an infected device is in a specified location; the stealing of WhatsApp messages via Accessibility Services; and the ability to connect an infected device to Wi-Fi networks controlled by cybercriminals. We observed many web landing pages that mimic the sites of mobile operators and which are used to spread the Android implants. These domains have been registered by the attackers since 2015. According to our telemetry, that was the year the distribution campaign was at its most active. The activities continue: the most recently observed domain was registered on October 31, 2017. Based on our KSN statistics, there are several infected individuals, exclusively in Italy. Moreover, as we dived deeper into the investigation, we discovered several spyware tools for Windows that form an implant for exfiltrating sensitive data on a targeted machine. The version we found was built at the beginning of 2017, and at the moment we are not sure whether this implant has been used in the wild. We named the malware Skygofree, because we found the word in one of the domains.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/"
|
||||
]
|
||||
},
|
||||
"uuid": "3e19d162-9ee1-11e8-b8d7-d32141691f1f"
|
||||
}
|
||||
],
|
||||
"version": 9,
|
||||
"version": 10,
|
||||
"uuid": "84310ba3-fa6a-44aa-b378-b9e3271c58fa",
|
||||
"description": "Android malware galaxy based on multiple open sources.",
|
||||
"authors": [
|
||||
|
|
|
@ -7995,7 +7995,9 @@
|
|||
".encryptedyourfiles",
|
||||
".weencedufiles",
|
||||
".iaufkakfhsaraf",
|
||||
".cifgksaffsfyghd"
|
||||
".cifgksaffsfyghd",
|
||||
".iloveworld",
|
||||
".weapologize"
|
||||
],
|
||||
"encryption": "AES(256) + RSA(2096)",
|
||||
"ransomnotes": [
|
||||
|
@ -8013,7 +8015,14 @@
|
|||
"001-READ-FOR-DECRYPT-FILES.html",
|
||||
"READ-READ-READ.html",
|
||||
"IF_WANT_FILES_BACK_PLS_READ.html",
|
||||
"READ_READ_DEC_FILES.html"
|
||||
"READ_READ_DEC_FILES.html",
|
||||
"HOW_TO_DECRYPT_FILES.html",
|
||||
"HELP_FOR_DECRYPT_FILE.html",
|
||||
"I_WILL_HELP_YOU_DECRYPT.html",
|
||||
"PLEASE_READ_FOR_DECRYPT_FILES.html",
|
||||
"WE-CAN-HELP-U.html",
|
||||
"0001-WE-CAN-HELP-U.html",
|
||||
"SORRY-FOR-FILES.html"
|
||||
],
|
||||
"refs": [
|
||||
"https://download.bleepingcomputer.com/demonslay335/SamSamStringDecrypter.zip",
|
||||
|
@ -10066,7 +10075,7 @@
|
|||
"source": "Various",
|
||||
"uuid": "10cf658b-5d32-4c4b-bb32-61760a640372",
|
||||
"name": "Ransomware",
|
||||
"version": 26,
|
||||
"version": 27,
|
||||
"type": "ransomware",
|
||||
"description": "Ransomware galaxy based on https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml and http://pastebin.com/raw/GHgpWjar"
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue