Kaspersky researchers have found a new sample of stalkerware – commercial software that is usually used to secretly monitor users’ partners or colleagues – which has functionality that supersedes all previously found software.
MonitorMinor enables stalkers to covertly access any data and track activity on devices they are surveying, as well as the most popular messaging services and social networks. The essence of stalkerware discourages user privacy, putting many people’s personal information and personal lives at risk. If people’s data is being monitored and controlled, the result is often non-cyber related consequences for the victims involved.
However, the creators of MonitorMinor even go through obfuscation of the application, demonstrating that they are well aware of the existence of anti-stalkerware tools and try to counter them.
While primitive stalkerware uses geofencing technology, enabling the operator to track the victim’s location, and in most cases intercept SMS and call data, MonitorMinor goes a few steps further.
Recognising the importance of messengers as a means of data collection, this software aims to get access to data from all the most popular modern communication tools.
While, in a “clean” Android operating system, direct communication between apps is prevented by the sandbox, the situation can be changed if a superuser-type app (SU utility) is installed, which grants root access to the system. Once this SU utility is installed, security mechanisms of the device no longer exist.
Using this utility, the creators of MonitorMinor enable full access to data on a variety of popular social media and messaging applications such as Hangouts, Instagram, Skype, Snapchat and others.
In addition, using root privileges, the stalkerware is able to access screen unlock patterns, enabling the stalkerware operator to unlock the device when it is nearby or when they next have physical access to the device. This is a feature which Kaspersky has previously not identified in any mobile platform threats.
Even without root access, the stalkerware can operate effectively by abusing the Accessibility Service API, which is designed to make devices friendly for users with disabilities. Using this API, the stalkerware is able to intercept any events in the applications and broadcast live audio.
Other features available in this stalkerware gives operators the ability to:
* Control devices using SMS commands;
* View real-time video from device cameras;
* Record sound from the device microphones;
* View browsing history in Google Chrome;
* View usage statistics for certain apps;
* View the contents of a device’s internal storage;
* View contacts lists; and
* View system logs.
“MonitorMinor is superior to other stalkerware in many aspects and implements all kinds of tracking features, some of which are unique, and is almost impossible to detect on the victim’s device,” comments Victor Chebyshev, Kaspersky research development team lead .
“This particular application is incredibly invasive – it completely strips the victim of any privacy in using their devices, and even enables the attacker to retrospectively look into what the victims has been doing before.
“Existence of such applications underlines the importance of protection from stalkerware and the need for joint effort in the fight for privacy. This is why it is important to highlight this application to our users which, in the hands of the abusers, could become the ultimate instrument for control. We have also pre-emptively shared information about this software with the Coalition Against Stalkerware partners, to protect as many users as possible, as soon as we can.”
According to Kaspersky telemetry, India currently has the largest share of installations of this stalkerware (14,71%). Mexico (11,76%) is next, followed by Germany, Saudi Arabia, and the UK (5,88% in each country), as other countries that have seen the most use of this new type of stalkerware.
Republished courtesy of IT-Online