DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home News

Unveiling Android Spyware ‘Predator’

Reading Time: 2 mins read
in News

Cisco Talos and Citizen Lab have conducted a technical analysis of the Android spyware ‘Predator’ and its loader ‘Alien,’ revealing its data-theft capabilities and operational details.

Developed and sold by Israeli company Intellexa, Predator has been associated with surveillance operations targeting journalists, European politicians, and Meta executives.

The spyware can record phone calls, gather information from messaging apps, hide applications, and circumvent Android security. Although some components of Predator remain unexplored, researchers speculate that they involve geolocation tracking, camera image capture, device power-off simulation, and kernel access.

Predator’s loader, Alien, exploits Android zero-day vulnerabilities to deploy itself and downloads additional spyware components based on a predetermined configuration.

By abusing SELinux’s contexts and bypassing its restrictions, Alien conceals the spyware’s activities within legitimate system processes. It communicates with Predator to execute commands discreetly while saving stolen data and recordings in shared memory space, evading detection by SELinux.

Predator itself, as the spearhead module, sets up a Python runtime environment to enable various espionage functions such as code execution, audio recording, certificate poisoning, application hiding, and directory enumeration.

The spyware enumerates user data directories from email, messaging, social media, and browser apps, as well as the victim’s contact list and private media files.

It employs certificate poisoning to install custom certificates that enable man-in-the-middle attacks for spying on TLS-encrypted network communication. However, these certificates are installed at the user level to avoid suspicion.

Two modules, ‘tcore’ and ‘kmem,’ are still missing from the analysis, but it is believed that ‘tcore’ performs geolocation tracking, camera image capture, and power-off simulation, while ‘kmem’ provides kernel access. These unanalyzed components remain a part of the unexplored territory of the Predator spyware.

Read More

Tags: AndroidCisco TalosCybersecurityEuropeMay 2023NewsNews 2023spywareVulnerabilitieszero-day vulnerability
ADVERTISEMENT

Related Posts

Memcyco Raises $10M for Website Security

Memcyco Raises $10M for Website Security

May 26, 2023
FinFisher Executives Indicted

FinFisher Executives Indicted

May 26, 2023
Enhancing Software Security with GUAC

Enhancing Software Security with GUAC

May 26, 2023
CommonSpirit: $160M Ransomware Cost

CommonSpirit: $160M Ransomware Cost

May 25, 2023

More Articles

Alerts

Bently Nevada security advisory

July 7, 2022
Quotes

“The trouble with ransomware right now..”

October 6, 2022
Jobs

Software Security Analyst

December 13, 2022
Tool

OWASP purpleteam

July 28, 2022
Vendors

Delinea

January 10, 2023
Incidents

California Clinic Network Cyber Incident Affects 656,000

November 2, 2021
Document

TTP-Based Hunting

June 29, 2022
Alerts

Indonesian Threat Actor Exploits AWS

May 23, 2023
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.