Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    Wednesday, February 11
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
    NotesleuNotesleu
    Home»Cybersecurity»State-Sponsored LightSpy Malware Targets WeChat Users for Payment Data Theft
    Cybersecurity

    State-Sponsored LightSpy Malware Targets WeChat Users for Payment Data Theft

    By securnerd3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Follow Us
    Google News

    In a startling revelation, cybersecurity experts have uncovered a highly advanced mobile malware, known as LightSpy, deployed in a targeted attack against iOS users in Hong Kong. This sophisticated Advanced Persistent Threat (APT), attributed to the state-sponsored group APT41, has now been found embedded with Android implant Core and 14 related plugins across 20 active servers, all geared towards attacking mobile users.

    Unlike conventional malware, LightSpy operates as a Mobile Advanced Persistent Threat (mAPT), employing innovative techniques to compromise mobile devices. Recent findings have exposed its insidious use of WeChat payment systems to pilfer payment data, eavesdrop on private communications, and execute various malicious activities.

    Reports shared with cybersecurity experts reveal that LightSpy is a fully-featured modular surveillance toolset. It employs an array of plugins for private data exfiltration, with a strong focus on the victim’s private information. Among its capabilities, LightSpy exfiltrates payment data from WeChat Pay, utilizing backend infrastructure for this sinister purpose. Additionally, the malware gains audio-related functions from WeChat, enabling the recording of VOIP conversations.

    Crucially, LightSpy cannot function as a standalone application; it operates as a plugin. The malware’s core is responsible for executing all functions essential for the entire attack chain. Core functionalities include device fingerprint gathering, establishing connections with control servers, retrieving commands, and updating itself, along with additional payload files, referred to as plugins.

    Among the 14 plugins identified, the location module plugin stands out for its ability to track victims’ locations, either capturing snapshots or setting up tracking intervals. Another significant plugin, Soundrecord, records audio and can initiate microphone recording immediately or at specified intervals, including incoming phone calls.

    Notably, the Bill plugin focuses on collecting information about the victim’s payment history from WeChat Pay, including details such as bill ID, transaction ID, date, and payment status.

    The relationship between iOS and Android commands in LightSpy reveals a complex network of interconnected plugins, each designed to exploit specific vulnerabilities and harvest sensitive data.

    A comprehensive report on LightSpy, published by ThreatFabric, provides detailed insights into the threat vector, source code, analysis, and other critical information.

    Indicators of Compromise

    Control servers:

    • DOMAINS: spaceskd[.]com
    • IPs: 103.27.108[.]207, 46.17.43[.]74

    File hashes (Second stage payload – smalmload.jar)

    • SHA256: 407abddf78d0b802dd0b8e733aee3eb2a51f7ae116ae9428d554313f12108a4c
    • SHA256: bd6ec04d41a5da66d23533e586c939eece483e9b105bd378053e6073df50ba99

    As cybersecurity experts continue to unravel the complexities of LightSpy, it underscores the evolving landscape of cyber threats. Vigilance and advanced security measures are paramount in safeguarding against such highly targeted and sophisticated attacks, ensuring the protection of user data and privacy.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 64

    Related Posts

    • Microsoft Unveils Security Copilot Early Access Program, Revolutionizing Threat Response
    • Ukrainian Authorities Detect Russian Hacker Campaign Seeking Evidence of War Crimes
    • OWASP Releases Version 1.0 of the Top 10 for Large Language Model (LLM) Applications
    • Microsoft Enhances Windows 11 Security with Kerberos Authentication Over NTLM Protocol
    Follow on Google News
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Microsoft Enhances Windows 11 Security with Kerberos Authentication Over NTLM Protocol

    October 15, 202318 Views

    New Nitrogen malware pushed via Google Ads for ransomware attacks

    July 27, 2023222 Views

    Cisco Uncovers Actively Exploited Zero-Day Vulnerabilities in IOS XE, Urges Immediate Action

    October 21, 202313 Views
    • Contact Us
    • About US
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.