New iOS, Android spyware targeting users in extortion campaign

Posted:
in General Discussion edited December 2020
A new mobile spyware is targeting both iOS and Android users in what appears to be an extortion campaign tied to illicit websites.

Credit: Lookout
Credit: Lookout


The malware, dubbed "Goontact," can steal data like contacts, SMS text messages, photos, and location information from an iPhone or Android. It currently appears limited to Chinese-speaking countries, Korea, and Japan.

According to the Lookout security researchers who discovered it, "Goontact" targets users who visit illicit sites, typically those offering escort services. The ultimate goal seems to be extortion or blackmail tied to users visiting or soliciting services from those sites.

The scam starts when a user is lured to a website hosting the spyware. Although they appear to be talking to an escort, scam victims are actually communicating with "Goontact" operators, who convince them that they need to side-load an app on their iOS or Android devices.

Although the spyware and similar scams are not uncommon, the portion of the campaign targeting iOS users has been previously unreported, Lookout said. The iOS version of "Goontact" primarily steals a user's phone number and contact list, though newer versions can also display a message to the victim.

Like other side-loaded iOS malware threats, "Goontact" operators use an Apple enterprise developer certificate to distribute the spyware outside of the App Store. The certificates used in the Spyware campaign all reference what appear to be legitimate companies, including credit unions and railroad corporations.

It isn't clear if those legitimate companies have been compromised, or if the bad actors masqueraded as representatives of them to obtain the certificates.

During the course of Lookout's research, the team noticed multiple certificates being revoked. Once they were, new identities appeared on distribution sites, indicating that "Goontact" operators had no trouble obtaining new certificates.

Who's at risk, and how to protect yourself

"Goontact" doesn't appear to have spread beyond China, Japan, Korea, Thailand, and Vietnam yet, though there's a chance that it or a similar spyware strain could.

The spyware operators rely on social engineering to convince users to side-load the malicious apps onto devices. Because of that, if you never attempt to side-load anything, you won't be at risk.

As far as general best practices, it's always recommended to only download apps through the official App Store from developers that you trust, and to keep the software on your iPhone, iPad, or other device up to date.

Update: Apple said it has revoked all the enterprise certificates used in the scam thus far, with one exception belonging to a developer that was compromised. The company said it's working with that developer to "safely revoke the certificate by the end of the week," and added that it has "already taken steps to block all the malicious enterprise profiles issued for that certificate."

Comments

  • Reply 1 of 7
    Funny how these types of situations always seem to boil down to gullible users.
    mike1SpamSandwichrazorpitwatto_cobra
  • Reply 2 of 7
    Would be really useful here to explain, or remind,  what “side-load” precisely implies in the context of iOS.
    I guess I knew but forgot...

    Installing some software outside of the app store? And if so, how is that accomplished?

    If there’s something users should avoid doing, it’s important to spell out exactly what they should not do !
    edited December 2020 ronnrazorpitwatto_cobra
  • Reply 3 of 7
    Stopped reading after “side-loading”...


    And yes, side-loading means installing an app outside of th e App Store. Here you find some details: https://searchmobilecomputing.techtarget.com/opinion/Did-you-know-how-easy-it-is-to-sideload-iOS-apps-to-your-iPhone

    Basically, whenever you encounter the request to side-load an app outside of of your company’s enterprise device management, chances are somebody wants to scam you. Just don’t.
    anantksundaramevolutrazorpitwatto_cobra
  • Reply 4 of 7
    Rayz2016Rayz2016 Posts: 6,957member
    evolut said:
    Would be really useful here to explain, or remind,  what “side-load” precisely implies in the context of iOS.
    I guess I knew but forgot...

    Installing some software outside of the app store? And if so, how is that accomplished?

    If there’s something users should avoid doing, it’s important to spell out exactly what they should not do !
    Don’t hang around escort websites. 
    Don’t install software from anywhere except the official App Store. 
    razorpitwatto_cobra
  • Reply 5 of 7
    “... And yes, side-loading means installing an app outside of th e App Store. Here you find some details: https://searchmobilecomputing.techtarget.com/opinion/Did-you-know-how-easy-it-is-to-sideload-iOS-apps-to-your-iPhone

    Basically, whenever you encounter the request to side-load an app outside of of your company’s enterprise device management...”
    Thanks for your technically informative answer, and especially for providing that link !!

    I never encountered such thing on iOS. 
    I always thought that the apps distributed via enterprise certificates only concerned iOS devices specially configured by the IT department of a company, and it’s not something I have paid much attention to. 
    watto_cobra
  • Reply 6 of 7
    Rayz2016 said:
    evolut said:
    “... Installing some software outside of the app store? And if so, how is that accomplished?

    If there’s something users should avoid doing, it’s important to spell out exactly what they should not do !
    Don’t hang around escort websites. 
    Don’t install software from anywhere except the official App Store. 
    Sorry, your answer is besides my point, and actually inaccurate IMHO. 

    I get from wonkothesane that the thing one should not do is to first accept a request to download an app, followed by some actions in Settings to positively trust the developper. 

    As long as one doesn’t do that, one can visit escort sites all they wish with no side-loading happening. Risk of malware embedded in the code remain, maybe, but that’s different from side-loading. 
    Please anyone correct me if I misunderstood the technical side of it.

    The article would have provided a better service to the reader with a section explaining/reminding side-loading since not everybody is familiar with the enterprise environment. 
    edited December 2020 watto_cobra
  • Reply 7 of 7
    Now, tell me again why the major businesses trying to get politicians to "break the AppStore monopoly" is working in the best interest of the user?

    I'm sorry, but… the average user will always end up doing the most "stupid" things ever when horny/greedy/lazy/told to; and then they'll run to media crying about how it's the manufactures fault that they repeatedly shot themselves in the foot by intentionally throwing out the real manual, and instead using an "alternative truth" provided by some anonymous internet troll called HurtingPeopleForTheLolzSince1993.

    Oh? Me bitter and hating people? Naaaaaaaw.
    watto_cobra
Sign In or Register to comment.