{"id":51923,"date":"2024-08-05T05:44:13","date_gmt":"2024-08-05T09:44:13","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=51923"},"modified":"2024-08-05T05:44:13","modified_gmt":"2024-08-05T09:44:13","slug":"new-spy-for-android-smartphones-lianspy","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/new-spy-for-android-smartphones-lianspy\/51923\/","title":{"rendered":"LianSpy: new mobile spyware for Android"},"content":{"rendered":"<p>Spyware is a dangerous tool that can be used to selectively monitor specific victims. Often the victims are employees in a single company, or residents in a single country. The new mobile spyware, which we discovered and dubbed LianSpy, targets \u2014 for now \u2014 users of Android smartphones in Russia, but the unconventional approaches it employs could potentially be applied in other regions as well. How it works and how to <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">guard against<\/a>\u00a0this new threat is the topic of this post.<\/p>\n<h2>What is LianSpy?<\/h2>\n<p>We discovered LianSpy in March 2024. However, our data indicates it\u2019s been active for at least three years \u2014 dating back to July 2021! How did LianSpy remain in the shadows for so long? The attackers meticulously cover their tracks. Upon launch, the malware hides its icon on the home screen and operates in the background using root privileges. This allows it to bypass Android status bar notifications, which would typically alert the victim that the smartphone is actively using the camera or microphone.<\/p>\n<p>LianSpy disguises itself as system applications and financial services. Interestingly, the attackers aren\u2019t interested in the victims\u2019 banking data. This spyware silently and discreetly monitors user activity by intercepting call logs, sending a list of installed applications to the attackers\u2019 server, and recording the smartphone\u2019s screen \u2014 mainly during messenger activity.<\/p>\n<h2>How does LianSpy work?<\/h2>\n<p>Unlike <a href=\"https:\/\/www.kaspersky.com\/blog\/triangulation-37c3-talk\/50166\/\" target=\"_blank\" rel=\"noopener nofollow\">other spyware<\/a> that exploits zero-click vulnerabilities, LianSpy requires some actions on the part of the victim. Upon launching, the malware checks if it has the necessary permissions to read contacts and call-logs, and use overlays. If not, it requests them. That done, it registers an Android Broadcast Receiver to get information about system events, enabling it to start or stop various malicious tasks.<\/p>\n<p>LianSpy uses root privileges in a rather unconventional way. <a href=\"https:\/\/www.kaspersky.com\/blog\/android-root-faq\/17135\/\" target=\"_blank\" rel=\"noopener nofollow\">Typically, they\u2019re used<\/a> to gain complete control over the device. However, in the case of LianSpy, the attackers make use of only a small part of the functionality available to superusers. Interestingly, root privileges are used so as to prevent their detection by security solutions.<\/p>\n<p>LianSpy is a post-exploitation Trojan, meaning that the attackers either exploited vulnerabilities to root Android devices, or modified the firmware by gaining physical access to victims\u2019 devices. It remains unclear which vulnerability the attackers might have exploited in the former scenario.<\/p>\n<p>Another feature of LianSpy is its combined use of <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/symmetric-encryption\/\" target=\"_blank\" rel=\"noopener\">symmetric<\/a> (one key for both encrypting and decrypting information) and <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/asymmetric-encryption\/\" target=\"_blank\" rel=\"noopener\">asymmetric<\/a> (separate public and private keys) encryption. Before being stolen, the data is encrypted with a symmetric algorithm, the key for which is encrypted asymmetrically. Only the attacker possesses the private key. For more details about LianSpy functionality, see <a href=\"https:\/\/securelist.com\/lianspy-android-spyware\/113253\/\" target=\"_blank\" rel=\"noopener\">our Securelist post<\/a>.<\/p>\n<h2>Who\u2019s behind LianSpy?<\/h2>\n<p>Good question. The attackers only utilize public services, not private infrastructure, which makes it difficult to definitively determine which hacker group is behind these attacks on Android smartphone users in Russia. The paymaster\u2019s identity is also not known, but, as <a href=\"https:\/\/www.kaspersky.com\/blog\/commercial-spyware\/50813\/\" target=\"_blank\" rel=\"noopener nofollow\">global practice shows<\/a>, such sophisticated cyberespionage campaigns are often instigated by groups affiliated with a nation-state actor.<\/p>\n<h2>How to guard against spyware surveillance?<\/h2>\n<ul>\n<li><strong>Download apps only from official stores and catalogs<\/strong>, but keep in mind that <a href=\"https:\/\/www.kaspersky.com\/blog\/malware-in-google-play-2023\/49579\/\" target=\"_blank\" rel=\"noopener nofollow\">spyware can infiltrate even those<\/a>.<\/li>\n<li><strong>Update your operating system regularly<\/strong> \u2014 not all malware can adapt to new security features.<\/li>\n<li><strong>Use well-known apps from trusted developers<\/strong>. Avoid alternative clients for instant messengers and other services, as they may contain malicious code (read more about spyware mods for <a href=\"https:\/\/www.kaspersky.com\/blog\/whatsapp-mods-canesspy\/49656\/\" target=\"_blank\" rel=\"noopener nofollow\">WhatsApp<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-signal-malware-in-google-play\/48937\/\" target=\"_blank\" rel=\"noopener nofollow\">Telegram and Signal<\/a>).<\/li>\n<li><strong>Use <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky for Android<\/a><\/strong>\u00a0to detect spyware such as LianSpy in a timely manner.<\/li>\n<li><strong>If you still don\u2019t have <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">reliable protection<\/a><\/strong>, <a href=\"https:\/\/www.kaspersky.com\/blog\/tinycheck-detects-spyware-stalkerware\/38030\/#:~:text=How%20to%20find%20a%20mobile%20spy%20with%20TinyCheck\" target=\"_blank\" rel=\"noopener nofollow\">use TinyCheck<\/a>, a spyware detection tool.<\/li>\n<li><strong>Only grant applications the permissions they need to function.<\/strong><\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-3\">\n","protected":false},"excerpt":{"rendered":"<p>We found new spyware targeting Android smartphone owners.<\/p>\n","protected":false},"author":2739,"featured_media":51924,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[105,43,714,768,723],"class_list":{"0":"post-51923","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-privacy","10":"tag-spyware","11":"tag-surveillance","12":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/new-spy-for-android-smartphones-lianspy\/51923\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/new-spy-for-android-smartphones-lianspy\/27853\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/new-spy-for-android-smartphones-lianspy\/23148\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/new-spy-for-android-smartphones-lianspy\/30497\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/new-spy-for-android-smartphones-lianspy\/28029\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/new-spy-for-android-smartphones-lianspy\/38018\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/new-spy-for-android-smartphones-lianspy\/28170\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/new-spy-for-android-smartphones-lianspy\/33960\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/new-spy-for-android-smartphones-lianspy\/33625\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2739"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=51923"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51923\/revisions"}],"predecessor-version":[{"id":51927,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51923\/revisions\/51927"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/51924"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=51923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=51923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=51923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}