Threat Actor Deadeye Jackal
Overview
Syria was the first Arab country to have a public Internet Army hosted on its national networks that can openly launch cyber attacks on its enemies. However, the nature of relationship between the government and the threat actor group has changed and unclear at present.
Capabilities
- Record audio or stream environment audio over raw socket when instructed.
- Click photos with device camera.
- Retrieve files from external storage like the files sent over Bluetooth, WhatsApp, Viber, Telegram, DCIM directories, Downloads, Pictures, etc.
- Enumerate installed apps including date and time.
- Attempt to execute attacker-specified commands or binary as roots.
- Retrieve contacts and related data such as call logs, contacts, text messages, etc.
- Location, direction, and acceleration of the device.
- Remotely updateable C2 IP and port.
- Hide icon.
- Retrieve battery levels, WiFi and GPS status, storage and cellular carrier info.
How Does It Work?
In the hacking campaign of the threat actor, their app uses fake versions of secure messaging apps like WhatsApp and Telegram to plant spyware on devices. As a tactic to remain undetected, the malicious app does not place an icon on the home screen. However, the app also avoids rapid battery drain, a sign of the installation of a malicious app. It has in-built two chances to connect back to its command and control servers.
As of now, the malicious app SilverHawk has been successful in carrying out its tasks while remaining stealthy at the same time.
Comments
Post a Comment