Google did not comment on a series of specific questions about the report, including whether Google agreed with the attribution to the North Korean regime, and other details about Lookout’s report.
Contact Us
Do you have more information about KoSpy, or other spyware? From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email. You also can contact TechCrunch via SecureDrop.
The report also said Lookout found some of the spyware apps on the third-party app store APKPure. An APKPure spokesperson said the company did not receive “any email” from Lookout.
The person, or people, in control of the developer’s email address listed on the Google Play page hosting the spyware app did not respond to TechCrunch’s request for comment.
Lookout’s Hebeisen, along with Alemdar Islamoglu, a senior staff security intelligence researcher, told TechCrunch that while Lookout doesn’t have any information about who specifically may have been targeted — hacked, effectively — the company is confident that this was a highly targeted campaign, most likely going after people in South Korea, who speak English or Korean.
Lookout’s assessment is based on the names of the apps they found, some of which are in Korean, and that some of the apps have Korean language titles and the user interface supports both languages, according to the report.
Lookout also found that the spyware apps use domain names and IP addresses that were previously identified as being present in malware and command and control infrastructure used by North Korean government hacking groups APT37 and APT43.
“The thing that is fascinating about the North Korean threat actors is that they are, it seems, somewhat frequently successful in getting apps into official app stores,” said Hebeisen.
Leave feedback about this
You must be logged in to post a comment.