Google warns users of Android phones infected with spyware

Google has alerted an unspecified number of Android phone users that they have been infected with a recently spotlighted spyware named Hermit. “We have identified victims in Kazakhstan and Italy”said Google’s Threat Analysis Team (TAG), in a blog post.

Unlike the Pegasus spyware, developed by NSO Group, which had “zero click” vulnerabilities on iPhone (the possibility of infecting a device without the user having done anything), the compromises observed by Google in Hermit’s case begins by sending a link to the victims.

The latter invites them to install an application pretending to be either a tool developed by a telephone operator or a messaging application. In some cases, according to Google, the Hermit user seeking to infect someone benefits from the complicity of a telephone company to disable the network of his target, and the phishing message invites him to reestablish his connection by passing through the infected application.

Lots of potentially stolen information

Whether it be on iOS or Android, Hermit uses different methods to make the victim install the application without going through the official stores (App Store and Google Play Store). Once nested in the telephone system, Hermit can then access a certain amount of personal information. On Android, for example, the application asks for permissions to activate the camera and microphone, read SMS, etc., among other things.

The new information published by Google comes a week after the specialized company Lookout released a long report on Hermit, which also relies on the discovery of infected victims in Kazakhstanbut also in Syria, in the northeast of the country, which is home to Kurdish populations in particular.

Read also: Kazakh activists targeted by Pegasus spyware

Google and Lookout believe that this spyware is developed by the Italian company RCS Lab, a company which, like many others, sells surveillance technologies to governments, police and intelligence services. On its site, RCS claims to have subsidiaries in Spain and France. “RCS is the European leader in lawful interception services, with more than 10,000 targets processed daily in Europe alone”, continues the company. The fact that Hermit sometimes relies on the complicity of telecommunications operators to infect its targets also corroborates the trail of a tool used by state actors.

Former partner of Hacking Team

As Lookout points out, documents released by WikiLeaks suggest that RCS Lab was, in the early 2010s, a partner of another controversial Italian company called Hacking Team. The spyware developer, whose emails were hacked and released by an activist in 2015, has notably been accused of selling surveillance technology to authoritarian countries.

Read also Hacking Team spyware vendor victim of massive hack

In exchanges of e-mails dated 2012, we can for example read discussions between representatives of Hacking Team and RCS, the first company offering the second to play the role of reseller for a potential customer: an information service Pakistani. In this same exchange, RCS offers to market one of Hacking Team’s tools to a government client in Turkmenistan. “You have the green light to present and promote our solution to the end user in Turkmenistan”wrote for example an important executive of Hacking Team.

In 2016, the specialized site Motherboard got their hands on a presentation made by RCS Lab to one of its customers for its own surveillance technology, at the time named Mito3.

Read our survey: Article reserved for our subscribers Sold as very safe, iPhones have been hacked by Pegasus for years

Internet giants like Google and Apple are watching the surveillance industry closely, as these companies are constantly looking for security holes in Android and iOS phones, in order to keep selling surveillance tools to their customers. In May, Google’s Threat Analysis Group claimed actively monitor nearly 30 companies marketing spy technologies.

source site