Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
KoSpy Komedy: North Korean Spyware Sneaks Into Google Play, Busted!
North Korean APT actor ScarCruft has been targeting Korean and English-speaking users with KoSpy, an Android surveillance tool. Disguised as utility apps, KoSpy has been lurking on Google Play, collecting data like call logs and device location. This malware makes James Bond look like a rookie with a magnifying glass.

Hot Take:
When it comes to espionage, North Korea’s ScarCruft is the James Bond of the digital world—if James Bond were a sneaky Android app pretending to be your phone’s best friend. KoSpy shows us that even in the world of cyber warfare, appearances can be deceiving. So, remember, not all apps that glisten are gold; some are just spyware in disguise, ready to steal your secrets faster than you can say ‘martini, shaken not stirred’.
Key Points:
- North Korean APT actor ScarCruft, also known as APT37, has been using an Android surveillance tool dubbed “KoSpy” since March 2022.
- KoSpy masquerades as legitimate utility apps and is distributed via Google Play, targeting primarily Korean and English-speaking users.
- The spyware uses Firebase Firestore for configuration retrieval and allows dynamic control of its command-and-control server.
- KoSpy can collect a variety of data, including SMS, call logs, device location, and more, sending encrypted information to remote servers.
- Lookout cybersecurity firm has traced this campaign primarily to ScarCruft, with potential ties to another North Korean hacking group, APT43.