October 11, 2019

Lookout Security Intelligence Team Discovery of ArmaSpy

How Lookout Detects and Protects Against Threats like ArmaSpy

Lookout Security Intelligence teams leverage both static and dynamic analysis with our machine learning engine to discover new threats. While ArmaSpy is a smaller and more targeted family, its unique heuristics and code structure are being analyzed against our data corpus of 170 million devices in order to get the most accurate understanding of the malware’s presence and evolution. Devices with Lookout installed have been protected against ArmaSpy since May 2019. Lookout also protects against other sophisticated malware that could normally go undetected.

Key Facts

  • Surveillanceware primarily targeting Iranian users. It’s also capable of intercepting 2FA.
  • Found in malicious versions of Google, Flashplayer, and adult content applications.
  • Overlapping C2 infrastructure with OilRig threat group.


Background and Discovery Timeline

Lookout researchers recently investigated the ArmaSpy surveillance family, which appears to have been targeting Iranian users since late 2016 with new samples discovered as recently as mid-2019. The interest in ArmaSpy came from the observation of the application’s ability to create a unique contact on the user’s device named HAMRAHAVVAL, the brand name of Mobile Telecommunication Company of Iran (MCI), as an attempt to blend into the user’s device. Multiple Iranian phone numbers were associated with this contact in the various samples of the family and were discovered to be part of command and control infrastructure acting as designated SMS servers.

Capabilities and Affected Parties

ArmaSpy’s capabilities have increased over time, with the most recent samples containing 20 unique commands that one would expect from surveillanceware, such as retrieving browser history, downloading files, and taking a photo whenever the device is unlocked.

Additionally, the actor can enable data usage and WiFi by simply sending SMS messages with predefined phrases in them. Those phrases can be customized per sample, likely allowing the actor to tailor the SMS messages to the target in order to avoid suspicion. A specific phrase over text also sets up a regex character sequence to detect digits in a string, theoretically allowing the malware to intercept 2FA codes the user might receive via SMS.

Primarily, ArmaSpy is found in malicious versions of apps such as Google, Flashplayer, and adult content apps. Interestingly, one of the C2 domains that ArmaSpy samples communicate back to resolves to an IP that simultaneously resolved to a domain that was part of known OilRig infrastructure, a threat group with suspected Iranian origins that has targeted Middle Eastern and international victims since 2014.

Authors

Lookout

Cloud & Endpoint Security

Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves.

Threat Type
Spyware
Entry Type
Threat Guidances
Platform(s) Affected
Spyware
Threat Guidances

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

HeaderHeaderHeaderHeader
CellCellCellCell
CellCellCellCell
CellCellCellCell
CellCellCellCell