KoSpy Komedy: North Korean Spyware Sneaks Into Google Play, Busted!

North Korean APT actor ScarCruft has been targeting Korean and English-speaking users with KoSpy, an Android surveillance tool. Disguised as utility apps, KoSpy has been lurking on Google Play, collecting data like call logs and device location. This malware makes James Bond look like a rookie with a magnifying glass.

Hot Take:

When it comes to espionage, North Korea’s ScarCruft is the James Bond of the digital world—if James Bond were a sneaky Android app pretending to be your phone’s best friend. KoSpy shows us that even in the world of cyber warfare, appearances can be deceiving. So, remember, not all apps that glisten are gold; some are just spyware in disguise, ready to steal your secrets faster than you can say ‘martini, shaken not stirred’.

Key Points:

  • North Korean APT actor ScarCruft, also known as APT37, has been using an Android surveillance tool dubbed “KoSpy” since March 2022.
  • KoSpy masquerades as legitimate utility apps and is distributed via Google Play, targeting primarily Korean and English-speaking users.
  • The spyware uses Firebase Firestore for configuration retrieval and allows dynamic control of its command-and-control server.
  • KoSpy can collect a variety of data, including SMS, call logs, device location, and more, sending encrypted information to remote servers.
  • Lookout cybersecurity firm has traced this campaign primarily to ScarCruft, with potential ties to another North Korean hacking group, APT43.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here