Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Gamaredon Targets Android with New Spyware

December 13, 2024
Reading Time: 2 mins read
in Alerts
Gamaredon Targets Android with New Spyware

Russian state-sponsored hacking group Gamaredon has been linked to the deployment of two new Android spyware tools, BoneSpy and PlainGnome, marking the first time the group has used mobile-only malware in its campaigns. These spyware tools primarily target Russian-speaking individuals in former Soviet states, including Uzbekistan, Kazakhstan, Tajikistan, and Kyrgyzstan. The group, which is affiliated with Russia’s Federal Security Service (FSB), is known for its cyber espionage activities, and these new tools represent a significant expansion of its targeting capabilities.

Both BoneSpy and PlainGnome are designed to collect a wide variety of sensitive information from infected devices. They are capable of gathering SMS messages, call logs, photos, device location, contact lists, and audio recordings from phone calls and ambient surroundings. These tools also attempt to gain root access to the devices, enhancing their ability to track and monitor their victims. While BoneSpy operates as a standalone application, PlainGnome acts as a dropper, installing additional surveillance payloads once granted the necessary permissions by the victim.

The malware is believed to be distributed through targeted social engineering tactics, with the spyware masquerading as legitimate apps. These include battery charge monitoring apps, photo gallery apps, a fake Samsung Knox app, and even a fully functional-but-trojanized Telegram app. The use of these deceptive methods reflects Gamaredon’s sophisticated approach to infiltrating devices and evading detection. These techniques suggest the spyware is designed for highly targeted campaigns rather than widespread, indiscriminate attacks.

Attribution of the spyware tools to Gamaredon is based on several key factors, including the overlap in infrastructure used by the group in previous desktop campaigns. The tools’ reliance on dynamic DNS providers and overlapping IP addresses that link to known Gamaredon command-and-control (C2) domains strengthens this connection. As geopolitical tensions rise in the region, especially following the invasion of Ukraine, the targeting of Central Asian countries may reflect worsening relations between these nations and Russia. The use of mobile spyware marks a new chapter in Gamaredon’s cyber espionage activities, further expanding its toolkit for surveillance and data exfiltration.

Reference:

  • Gamaredon Unleashes BoneSpy and PlainGnome Spyware in Central Asia
Tags: AndroidBoneSpyCyber AlertsCyber Alerts 2024cyber espionageCyber threatsDecember 2024GamaredonKazakhstanKyrgyzstanPlainGnomeRussiaspywareTajikistanUzbekistan
ADVERTISEMENT

Related Posts

Yes24 Down After Cyberattack

Win-DDoS Flaws Enable DC DDoS Botnets

August 12, 2025
Yes24 Down After Cyberattack

GPT-5 Jailbreak, Zero-Click AI Threats

August 12, 2025
Yes24 Down After Cyberattack

7-Zip Flaw Enables Arbitrary Code Run

August 12, 2025
WinRAR Zero-Day Actively Exploited

WinRAR Zero-Day Actively Exploited

August 11, 2025
WinRAR Zero-Day Actively Exploited

Lenovo Linux Webcam BadUSB Flaw

August 11, 2025
WinRAR Zero-Day Actively Exploited

Tesla-Themed Malware in Google Ads

August 11, 2025

Latest Alerts

Win-DDoS Flaws Enable DC DDoS Botnets

GPT-5 Jailbreak, Zero-Click AI Threats

7-Zip Flaw Enables Arbitrary Code Run

Tesla-Themed Malware in Google Ads

Lenovo Linux Webcam BadUSB Flaw

WinRAR Zero-Day Actively Exploited

Subscribe to our newsletter

    Latest Incidents

    Columbia Data Breach Hits 900K

    Chinese Gang Hits 115M US Payment Cards

    Yes24 Down After Cyberattack

    University of WA Major Data Breach

    Google Ads Customers’ Data Breach

    Connex Credit Union Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial