Security News > 2020 > July > Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware

Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware
2020-07-22 16:14

Hebeisen walks listeners through what these new tools are and how they were used in a seven-year long surveillanceware campaign against the Uyghur ethnic minority group.

The campaign really started to take shape in our view of all of this in late 2019, when we were looking into the SilkBean family in particular, when we started looking deep into the infrastructure involved in SilkBean, we found many connections to the other malware families involved in this and this whole web of interconnections started to unravel.

CH: So as I already mentioned, the earliest samples started showing up in 2012, and we believe that, that the production samples that were actually used in the campaign are from 2013.

There certainly seems to be an uptick in the use of mobile surveillanceware by state actors and state sponsored campaigns, so certainly, certainly there is that visibility.

So when we are looking at campaigns in Morocco, where potentially zero click or at most one click attacks were used both in campaigns like the one that we saw in China where the malware is app based and requires the user to install an app.


News URL

https://threatpost.com/going-down-the-spyware-rabbit-hole-with-silkbean-mobile-malware/157619/