Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Gamaredon Targets Android with New Spyware

December 13, 2024
Reading Time: 2 mins read
in Alerts
Gamaredon Targets Android with New Spyware

Russian state-sponsored hacking group Gamaredon has been linked to the deployment of two new Android spyware tools, BoneSpy and PlainGnome, marking the first time the group has used mobile-only malware in its campaigns. These spyware tools primarily target Russian-speaking individuals in former Soviet states, including Uzbekistan, Kazakhstan, Tajikistan, and Kyrgyzstan. The group, which is affiliated with Russia’s Federal Security Service (FSB), is known for its cyber espionage activities, and these new tools represent a significant expansion of its targeting capabilities.

Both BoneSpy and PlainGnome are designed to collect a wide variety of sensitive information from infected devices. They are capable of gathering SMS messages, call logs, photos, device location, contact lists, and audio recordings from phone calls and ambient surroundings. These tools also attempt to gain root access to the devices, enhancing their ability to track and monitor their victims. While BoneSpy operates as a standalone application, PlainGnome acts as a dropper, installing additional surveillance payloads once granted the necessary permissions by the victim.

The malware is believed to be distributed through targeted social engineering tactics, with the spyware masquerading as legitimate apps. These include battery charge monitoring apps, photo gallery apps, a fake Samsung Knox app, and even a fully functional-but-trojanized Telegram app. The use of these deceptive methods reflects Gamaredon’s sophisticated approach to infiltrating devices and evading detection. These techniques suggest the spyware is designed for highly targeted campaigns rather than widespread, indiscriminate attacks.

Attribution of the spyware tools to Gamaredon is based on several key factors, including the overlap in infrastructure used by the group in previous desktop campaigns. The tools’ reliance on dynamic DNS providers and overlapping IP addresses that link to known Gamaredon command-and-control (C2) domains strengthens this connection. As geopolitical tensions rise in the region, especially following the invasion of Ukraine, the targeting of Central Asian countries may reflect worsening relations between these nations and Russia. The use of mobile spyware marks a new chapter in Gamaredon’s cyber espionage activities, further expanding its toolkit for surveillance and data exfiltration.

Reference:

  • Gamaredon Unleashes BoneSpy and PlainGnome Spyware in Central Asia
Tags: AndroidBoneSpyCyber AlertsCyber Alerts 2024cyber espionageCyber threatsDecember 2024GamaredonKazakhstanKyrgyzstanPlainGnomeRussiaspywareTajikistanUzbekistan
ADVERTISEMENT

Related Posts

Hackers Use Leaked Shellter License Malware

Windows BitLocker Vulnerability Flaw

July 9, 2025
Hackers Use Leaked Shellter License Malware

Hackers Use Leaked Shellter License Malware

July 9, 2025
Hackers Use Leaked Shellter License Malware

Anatsa Android Trojan Targets 90K Users

July 9, 2025
AMOS Mac Stealer Adds Persistent Backdoor

AMOS Mac Stealer Adds Persistent Backdoor

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

NordDragonScan Malware Steals Windows Data

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

New Ransomware BERT Targets ESXi Systems

July 8, 2025

Latest Alerts

Windows BitLocker Vulnerability Flaw

Anatsa Android Trojan Targets 90K Users

Hackers Use Leaked Shellter License Malware

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

Subscribe to our newsletter

    Latest Incidents

    Credit Reports Breached And Sold On Dark Web

    Recruiting Software Exposed 26M Resumes

    Norwegian Municipalities Hit by Data Breach

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial