ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool MOONSHINE

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: MOONSHINE

NamesMOONSHINE
CategoryMalware
TypeBackdoor, Info stealer
Description(Citizen Lab) MOONSHINE is designed for stealthy rootless operation, by exploiting popular legitimate Android apps with built-in browsers that request sensitive permissions. MOONSHINE obtains persistence by overwriting an infrequently used shared library (.so) file in one of these apps with itself. When a targeted user opens the legitimate app after exploitation, the app loads the shared library into memory, which causes the spyware to activate. While code in subsequent stages of MOONSHINE suggests that it can be deployed against four apps (Facebook, Facebook Messenger, WeChat, and QQ), the exploit site we tested against did not deliver any exploits for WeChat or QQ User-Agent headers.
Information<https://citizenlab.ca/2019/09/poison-carp-tibetan-groups-targeted-with-1-click-mobile-exploits/>

Last change to this tool card: 20 April 2020

Download this tool card in JSON format

Previous: MoonPeak
Next: MoonWalk

All groups using tool MOONSHINE

ChangedNameCountryObserved

APT groups

 Poison Carp, Evil EyeChina2018-Jun 2023X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]