Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

New North Korean Android Spyware Uncovered: A Threat to Global Cybersecurity


A sophisticated North Korean Android spyware known as "KoSpy" has been uncovered, posing a significant threat to global digital security. With its ability to intercept SMS logs, track GPS locations, read files, and capture device images, KoSpy is the latest example of state-sponsored cyber threats evolving in complexity.

  • KoSpy is a highly sophisticated Android spyware linked to North Korea's APT37 threat group.
  • The malware was discovered on Google Play and APKPure through five malicious apps, posing a significant threat to global digital security.
  • APT37 has been actively developing KoSpy since March 2022, targeting Korean and English-speaking users with stealthy tactics.
  • The malware loads in the background via disguising itself as file managers, security tools, and software updaters.
  • KoSpy can retrieve updated settings from a Firebase Firestore database to evade detection.
  • The malware's data collection capabilities include SMS interception, GPS tracking, file reading, audio recording, camera capture, screenshot capture, and keystroke logging.
  • Users need to manually uninstall the apps, scan their devices with security tools, and consider a factory reset in critical cases.



  • The world of cybersecurity has recently witnessed a significant escalation as a new, highly sophisticated Android spyware known as "KoSpy" has emerged, linked to North Korea's notorious threat group APT37 (aka 'ScarCruft'). This malicious entity was discovered on Google Play and third-party app store APKPure through at least five malicious apps, marking a significant threat to the global digital landscape.

    According to Lookout researchers, the KoSpy spyware has been actively developed by APT37 since March 2022, with its primary target being Korean and English-speaking users. The campaign's tactics involve disguising itself as file managers, security tools, and software updaters, ensuring a high degree of stealth and deception.

    The five apps identified by Lookout as part of the KoSpy campaign are 휴대폰 관리자 (Phone Manager), File Manager (com.file.exploer), 스마트 관리자 (Smart Manager), 카카오 보안 (Kakao Security), and Software Update Utility. While these apps may appear legitimate, they actually load the KoSpy spyware in the background.

    The KoSpy campaign is attributed to APT37 based on IP addresses previously linked to North Korean operations, domains that facilitated the distribution of Konni malware, and infrastructure that overlaps with APT43, another DPRK-sponsored threat group. This connection solidifies KoSpy's place as a significant entry in the ever-evolving world of state-sponsored cyber threats.

    Upon activation on a device, KoSpy retrieves an encrypted configuration file from a Firebase Firestore database to evade detection. It then connects to its actual command and control (C2) server and runs checks to ensure it is not running in an emulator. The malware can retrieve updated settings from the C2, additional payloads to execute, and be activated/deactivated dynamically via an "on/off" switch.

    KoSpy's data collection capabilities are extensive and include:

    - SMS and call logs interception
    - Tracks victim's GPS location in real-time
    - Reads and exfiltrates files from local storage
    - Uses the device's microphone to record audio
    - Uses the device's camera to capture photos and videos
    - Captures screenshots of the device display
    - Records keystrokes via Android Accessibility Services

    Each app uses a separate Firebase project and C2 server for data exfiltration, which is encrypted with a hardcoded AES key prior to transmission. This adds an extra layer of complexity and security to the malware's operations.

    Although the spyware apps have been removed from both Google Play and APKPure, users will need to manually uninstall them and scan their devices with security tools to uproot any remnants of the infection from their devices. In critical cases, a factory reset is recommended. Google Play Protect can also block known malicious apps, providing an additional layer of protection against KoSpy on up-to-date Android devices.

    The recent removal of the KoSpy apps from Google Play by a Google spokesperson and the shutdown of corresponding Firebase projects demonstrate Google's commitment to protecting users from such threats. The use of regional language in the malware suggests that it was intended as targeted malware, specifically aimed at Korean-speaking users before being made available on global platforms like Google Play.

    The emergence of KoSpy serves as a stark reminder of the ongoing struggle against state-sponsored cyber threats and the importance of cybersecurity awareness and proactive measures to prevent such attacks. As the world of cybersecurity continues to evolve with new threats emerging regularly, it is crucial for individuals and organizations alike to stay vigilant and adapt their defenses accordingly.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/New-North-Korean-Android-Spyware-Uncovered-A-Threat-to-Global-Cybersecurity-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/new-north-korean-android-spyware-slips-onto-google-play/

  • https://attack.mitre.org/groups/G0067/

  • https://cybersecuritynews.com/apt37-hackers-abusing-group-chats/


  • Published: Wed Mar 12 13:58:03 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us