Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    ‘Anti-woke’ GOP presidential candidate says he wouldn’t ban transgender service in military

    June 4, 2023

    The Ashes: Jack Leach ruled out of series with back stress fracture | Cricket News

    June 4, 2023

    After investing $28B in Slack, Salesforce bets on one of its own as new CEO

    June 4, 2023
    Facebook Twitter Instagram
    • About Us
    • Contact Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Facebook Twitter Instagram Pinterest Vimeo
    Weis
    • Home
    • Crypto
      1. Cryptocurrency Live Price
      2. View All

      ‘Anti-woke’ GOP presidential candidate says he wouldn’t ban transgender service in military

      June 4, 2023

      The Ashes: Jack Leach ruled out of series with back stress fracture | Cricket News

      June 4, 2023

      After investing $28B in Slack, Salesforce bets on one of its own as new CEO

      June 4, 2023

      Lech Walesa joins hundreds of thousands of Poles in anti-govt march in Warsaw

      June 4, 2023

      Three Reasons Behind Bitcoin's 2023 Resurgence

      June 4, 2023

      5 free ChatGPT and generative AI courses

      June 4, 2023

      Whale’s ARB Accumulation Rekindles Momentum For DeFi Token

      June 4, 2023

      Largest Victim Reportedly Lost 2.8M USDT

      June 4, 2023
    • Insurance

      ANALYSIS – Breakup of Insurers’ Climate Coalition Driven by U.S. Regulation Fears

      June 4, 2023

      Judge Dismisses Criminal Charges Against PG&E Energy in Fatal California Wildfire

      June 4, 2023

      Reinsurers Maintain Their ‘Heightened Risk Aversion’ During June 1 Renewals: Report

      June 4, 2023

      Former Arizona County Official Who Said Election Deniers Made Work ‘Toxic’ Gets $130K

      June 4, 2023

      Amputation Frees Woman From Collapsed Iowa Building

      June 4, 2023
    • International News

      Lech Walesa joins hundreds of thousands of Poles in anti-govt march in Warsaw

      June 4, 2023

      Migrants flown from Texas to California and left outside church were ‘lied to’ | US immigration

      June 4, 2023

      Most Victims Unidentified as Relatives Struggle to Reach India Train Crash Site

      June 4, 2023

      Brazil’s Lula is right on global politics and wrong on Ukraine | Opinions

      June 4, 2023

      Christian B ‘claims five chilling words made him prime Madeleine McCann suspect’

      June 4, 2023
    • Politics

      ‘Anti-woke’ GOP presidential candidate says he wouldn’t ban transgender service in military

      June 4, 2023

      Search of Nicola Sturgeon’s home ‘proportionate and necessary’, says police chief | Scotland

      June 4, 2023

      Chuck Todd stepping down from NBC’s ‘Meet The Press’

      June 4, 2023

      Signalling system error led to deadly train crash: India minister | News

      June 4, 2023

      California officials investigating migrant arrivals in Sacramento: ‘Without any advance warning’

      June 4, 2023
    • Sports

      The Ashes: Jack Leach ruled out of series with back stress fracture | Cricket News

      June 4, 2023

      French Open 2023 results: Novak Djokovic beats Juan Pablo Varillas at Roland Garros

      June 4, 2023

      Man charged after wearing shirt appearing to reference Hillsborough disaster

      June 4, 2023

      Latest from the French Open fourth round

      June 4, 2023

      Never-Ending Line for Caitlin Clark Autograph Session Shows Immense Star Power of Iowa Standout

      June 4, 2023
    • Tech

      After investing $28B in Slack, Salesforce bets on one of its own as new CEO

      June 4, 2023

      This new Steam update will show you the lowest price a game has sold for in the last 30 days

      June 4, 2023

      What could Apple’s VR headset possibly do to justify its $3,000 price tag?

      June 4, 2023

      What Would AI Regulation Look Like?

      June 4, 2023

      Nintendo’s ‘1-2 Switch’ party game is getting a sequel

      June 4, 2023
    • Shop
    Subscribe
    Weis
    Home»Tech»Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days
    Tech

    Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days

    AuthorBy AuthorMay 27, 2023No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    An image depicting a phone infected with malware

    Smartphone malware sold to governments around the world can secretly record voice calls and nearby audio, collect data from apps like Signal and WhatsApp, and hide apps or prevent them from running across device reboots , researchers from Cisco’s Talos security team found.

    An analysis published by Talos on Thursday provides the most detailed look at Predator, a piece of advanced spyware that can be used against Android and iOS mobile devices. Predator was developed by Cytrox, a company that Citizen Lab says is part of an alliance called Intellexa, “a marketing label for a range of mercenary surveillance vendors emerging in 2019.” Other companies belonging to the consortium include Nexa Technologies (formerly Amesys), WiSpear/Passitora Ltd., and Senpai.

    Last year, researchers at Google’s Threat Analysis Group, which tracks cyberattacks carried out or funded by nation-states, reported that Predator bundled five separate zero-day exploits into one package and sold them of various actors supported by the government. These buyers continue to use the package in three separate campaigns. The researchers say that the Predator works closely with a component known as the Alien, which “lives inside many privileged processes and receives orders from the Predator.” Commands include recording audio, adding digital certificates, and hiding apps.

    Citizen Lab, meanwhile, said the Predator was sold to several government actors from countries including Armenia, Egypt, Greece, Indonesia, Madagascar, Oman, Saudi Arabia, and Serbia. Citizen Lab went on to say that the Predator was used to target Ayman Nour, a member of the Egyptian political opposition living in exile in Turkey, and an Egyptian exiled journalist who hosted a popular news program and want to remain anonymous.

    Unknown until now

    Much of the inner workings of the Predator were previously unknown. That has changed now that Talos has acquired key pieces of malware written for Android devices.

    According to Talos, the backbone of the malware consists of Predator and Alien. Contrary to previous understandings, the Alien is more than just a Predator loader. Instead, it actively implements the low-level capabilities the Predator needs to monitor its prey.

    Advertisement

    “New analysis from Talos has uncovered the inner workings of PREDATOR and the mechanisms it uses to communicate with other spyware components deployed alongside it known as ‘ALIEN,'” it stated. in Thursday’s post. “The two components work together to bypass the traditional security features of the Android operating system. Our findings reveal the extent of the interweaving of capabilities between PREDATOR and ALIEN, providing proof that the ALIEN is more than a loader for PREDATOR as previously thought.

    In the sample analyzed by Talos, Alien took over the targeted devices by exploiting five vulnerabilities—CVE-2021-37973, CVE-2021-37976, CVE-2021-38000, CVE-2021-38003, CVE-2021-1048 affecting Google Chrome, and finally Linux and Android.

    Alien and Predator work together to bypass restrictions in the Android security model, particularly those enforced by a protection known as SELinux. Among other things, Android’s SELinux closely monitors access to most sockets, which serve as communication channels between different running processes and are often abused by malware.

    One way to do this is to load Alien into the memory space reserved for Zygote64, the method Android uses to launch apps. That maneuver allows the malware to manage the stolen data.

    “By storing the recorded audio in a shared memory area using ALIEN, then saving it to disk and exfiltrating it using PREDATOR, this restriction can be bypassed,” the Talos researchers wrote. “This is a simplified view of the process – remember that ALIEN is injected into the zygote address space to pivot to special privileged processes within the Android authorization model. Because the zygote is the process parent of most Android processes, it can change to most UIDs and switch to other SELinux contexts with different privileges. Therefore, this makes zygote a good target for starting those operation that requires multiple permission sets.

    The predator, in turn, relies on two additional components:

    • Tcore is the main component and contains the core functionality of the spyware. Surveillance capabilities include audio recording and information gathering from Signal, WhatsApp and Telegram, among other apps. Peripheral functionalities include the ability to hide applications and prevent applications from executing on device reboot.
    • Kmem, which provides arbitrary read and write access to the kernel address space. This access comes courtesy of Alien exploiting CVE-2021-1048, which allows the spyware to perform most of its functions.

    A deeper dive will likely help engineers develop better defenses to detect Predator spyware and prevent it from working as designed. Talos researchers did not get versions of Predator made for iOS devices.

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleGuatemala court disqualifies top candidate ahead of vote – DW – 05/27/2023
    Next Article Will Ferrell to Star as John Madden in Movie Based on Legend’s Life, Video Game | News, Scores, Highlights, Stats, and Rumors
    Author
    • Website

    Related Posts

    Tech

    After investing $28B in Slack, Salesforce bets on one of its own as new CEO

    June 4, 2023
    Tech

    This new Steam update will show you the lowest price a game has sold for in the last 30 days

    June 4, 2023
    Tech

    What could Apple’s VR headset possibly do to justify its $3,000 price tag?

    June 4, 2023
    Add A Comment

    Leave A Reply Cancel Reply

    Top Posts

    ‘Anti-woke’ GOP presidential candidate says he wouldn’t ban transgender service in military

    June 4, 2023

    Tablet PC Market to Witness Exponential Growth by 2028, Sources Say

    January 11, 2020

    Save $25 on Philips Wired Headphone For A Great Sounding Over-Ear Headphone

    January 12, 2020
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Crypto

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    AuthorJanuary 15, 2021
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    AuthorJanuary 15, 2021
    8.9
    Uncategorized

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    AuthorJanuary 15, 2021

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    ‘Anti-woke’ GOP presidential candidate says he wouldn’t ban transgender service in military

    June 4, 2023

    Tablet PC Market to Witness Exponential Growth by 2028, Sources Say

    January 11, 2020

    Save $25 on Philips Wired Headphone For A Great Sounding Over-Ear Headphone

    January 12, 2020
    Our Picks

    ‘Anti-woke’ GOP presidential candidate says he wouldn’t ban transgender service in military

    June 4, 2023

    The Ashes: Jack Leach ruled out of series with back stress fracture | Cricket News

    June 4, 2023

    After investing $28B in Slack, Salesforce bets on one of its own as new CEO

    June 4, 2023

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Type above and press Enter to search. Press Esc to cancel.