- Iran: Eight Prisoners Hanged on Drug Charges
- Daughter of late Iranian president jailed for ‘spreading lies’ - IRAN: Annual report on the death penalty 2016 - Taheri Facing the Death Penalty Again - Dedicated team seeking return of missing agent in Iran - Iran Arrests 2, Seizes Bibles During Catholic Crackdown
- Trump to welcome Netanyahu as Palestinians fear U.S. shift
- Details of Iran nuclear deal still secret as US-Tehran relations unravel - Will Trump's Next Iran Sanctions Target China's Banks? - Don’t ‘tear up’ the Iran deal. Let it fail on its own. - Iran Has Changed, But For The Worse - Iran nuclear deal ‘on life support,’ Priebus says
- Female Activist Criticizes Rouhani’s Failure to Protect Citizens
- Iran’s 1st female bodybuilder tells her story - Iranian lady becomes a Dollar Millionaire on Valentine’s Day - Two women arrested after being filmed riding motorbike in Iran - 43,000 Cases of Child Marriage in Iran - Woman Investigating Clinton Foundation Child Trafficking KILLED!
- Senior Senators, ex-US officials urge firm policy on Iran
- In backing Syria's Assad, Russia looks to outdo Iran - Six out of 10 People in France ‘Don’t Feel Safe Anywhere’ - The liberal narrative is in denial about Iran - Netanyahu urges Putin to block Iranian power corridor - Iran Poses ‘Greatest Long Term Threat’ To Mid-East Security |
Wednesday 28 October 2015Iranian hackers show interest in Android spying tools
Iranian hackers are showing strong interest in malware that can secretly pull data from Android devices, which are popular in the Middle East. The analysis comes from Recorded Future, a cybersecurity intelligence firm based in Somerville, Massachusetts. One of Recorded Future's specialties is monitoring hacking forums, looking for clues and chatter that might indicate future attacks. Over the last six months, there appears to have been high interest on Iranian hacking forums in remote access tools, or programs designed to listen to calls and collect text message and GPS data, according to a blog post. The most-discussed tools were AndroRAT and DroidJack. AndroRAT is free and has been around for close to four years, while DroidJack appeared last year. "With a low level of technical skill needed, open availability and strong community support on hacker forums, DroidJack and AndroRAT are likely to remain popular choices for threat actors seeking to take advantage of Middle Eastern mobile systems," Recorded Future wrote. The fact that Iranian hackers are embracing them now shows that threat actors are adapting to go after platforms that are popular in their own countries or regions, the company wrote. The tools to do so may be easy to get. DroidJack has its own website. It costs US$210, and its developers aren't cagey about the app's mission: "DroidJack gives you the power to establish control over your beloveds' Android devices with an easy-to-use GUI and all the features you need to monitor them." Tricking someone into installing such apps without their knowledge is illegal in most countries. Symantec wrote in November 2014 that it found the names and phone numbers of people supposedly based in India who developed DroidJack. AndroRAT has been an open-source project. Like DroidJack, it can be wrapped into a legitimate Android app's application package (APK) in order to deceive people into installing it. "The sustained Iranian interest in AndroRAT, despite its age and declining chatter from other sources, could be due to the easy download access, including GitHub repositories, and available community support for deploying the malware," Recorded Future wrote. http://www.computerworld.com/article/2998397/security/iranian-hackers-show-interest-in-android-spying-tools.html#tk.rss_news |