ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool lightSpy

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: lightSpy

NameslightSpy
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer, Exfiltration
Description(Trend Micro) The iOS malware, which we named 'lightSpy' (detected by Trend Micro as IOS_LightSpy.A), is a modular backdoor that allowed the attacker to remotely execute a shell command and manipulate files on the infected device. It is also implemented with several functionalities through different modules for exfiltrating data from the infected device including:

• Hardware information
• Contacts
• Keychain
• SMS messages
• Phone call history
• GPS location
• Connected Wi-Fi history
• Browser history of Safari and Chrome

The malware also reports the surrounding environment of the device by:
• Scanning local network IP address
• Scanning available Wi-Fi network

The campaign also employs modules specifically designed to exfiltrate data from popular messenger applications such as QQ, WeChat, and Telegram.
Information<https://documents.trendmicro.com/assets/Tech-Brief-Operation-Poisoned-News-Hong-Kong-Users-Targeted-with-Mobile-Malware-via-Local-News-Links.pdf>
<https://securelist.com/ios-exploit-chain-deploys-lightspy-malware/96407/>
<https://blog.trendmicro.com/trendlabs-security-intelligence/operation-poisoned-news-hong-kong-users-targeted-with-mobile-malware-via-local-news-links/>
<https://blogs.blackberry.com/en/2024/04/lightspy-returns-renewed-espionage-campaign-targets-southern-asia-possibly-india>
<https://www.threatfabric.com/blogs/lightspy-implant-for-macos>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/ios.lightspy>

Last change to this tool card: 19 June 2024

Download this tool card in JSON format

Previous: LightsOut EK
Next: LIGHTWIRE

All groups using tool lightSpy

ChangedNameCountryObserved

APT groups

 Operation Poisoned News, TwoSail JunkChina2020 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]