It has been reported that a cyber espionage group believed to be out of Iran and known for targeting telecommunications providers and government bodies in the Middle East has added to its arsenal malware for targeting Android devices. The so-called MuddyWater hacking group, which has been in action since at least 2017, also has created new backdoor malware for spying on its targets, and has been spotted employing false flag tactics to throw off researchers and investigators, according to security researchers at Trend Micro, who here today shared the details of the Iranian hacking team’s latest activities.
Tom Davison, EMEA Director at Lookout:
“This is another example of a potential nation-state actor turning to mobile as a way to enrich their surveillance capabilities. The breadth of information that can be obtained from a mobile device makes them an attractive target. Users struggle to identify phishing links on mobile and are often willing to download unvetted apps. This, coupled with a lower instance of security solutions on mobile, makes the job of the actors even easier”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.