A newly discovered mobile malware implant nicknamed BusyGasper might leave a few Android users breathless, if they knew about the unusual set of features the spyware uses to snoop on them.
In an Aug. 29 blog post, Kaspersky Lab researcher Alexey Firsh reports that BusyGasper has existed since at least May 2016. But there's a good reason it's managed to fly under the radar until recently: there are fewer than 10 victims, all apparently based in Russia. (And two of these may be test devices.) In fact, Kaspersky believes the infection vector for this limited allotment of devices could be a manual installation method that requires physical access to the targeted equipment.
In its current form, the modular malware can reportedly issue around 100 commands, and its capabilities include spying on device sensors (including motion detectors), exfiltrating data from messaging apps (e.g., WhatsApp, viber and Facebook), keylogging, and bypassing the Doze battery saver.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.