Connect with us

Hi, what are you looking for?


Malware & Threats

Researchers Out Spy Tools That Let Governments Hack Your Smartphone

Sergey Golovanov and Morgan Marquis-Boire Present Research

Morgan Marquis-Boire and Sergey Golovanov Present Research on HackingTeam’s Remote Control System “Galileo” in London on June 24

Sergey Golovanov and Morgan Marquis-Boire Present Research

Morgan Marquis-Boire and Sergey Golovanov Present Research on HackingTeam’s Remote Control System “Galileo” in London on June 24

Researchers from Kaspersky Lab and Citizen Lab have uncovered new details on advanced surveillance tools offered by the Italian company HackingTeam, including never before seen implants for smartphones running on iOS and Android.

In addition to sharing details of the mobile threats, researchers from the two organizations detailed what they call a “massive international infrastructure” used to control ‘Remote Control System’ (RCS) malware implants.

Sold as “legal” spyware or lawful interception tools, the Trojans are part of the suite called RCS, aka Galileo (PDF), developed by HackingTeam.

Kaspersky Lab worked closely with Morgan Marquis-Boire of Citzen Lab, who has been researching the HackingTeam malware set extensively.

Sergey Golovanov, Principal Security Researcher at Kaspersky Lab and Marquis-Boire presented the research (PDF) at a press event in London on Tuesday.

It was previously known that HackingTeam’s mobile Trojans for iOS and Android existed, but they had not been identified before being used in attacks, Kaspersky said.

According to the report, the operators behind the Galileo RCS built a specific malicious implant for each specific target, which the attacker delivers to the mobile device of the victim.

Advertisement. Scroll to continue reading.

Known infection vectors include spear-phishing via social engineering – often coupled with exploits, including zero-days –and local infections via USB cables while synchronizing mobile devices.

According to Marquis-Boire, the list of victims targeted by the tools includes activists and human rights advocates, as well as journalists and politicians.

Fortunately, successfully compromising an iPhone can be challenging, as installing the Galileo RCS mobile Trojan requires the device to be jailbroken. However, non-jailbroken iPhones can become vulnerable as well, Kaspersky warned, as an attacker could run a jailbreaking tool such as ‘Evasi0n’ via a previously infected computer and conduct a remote jailbreak.

“The fact that only jailbroken iOS devices are supported can be a limiting factor,” the report said. “In this case the only thing that can protect a user from a remote jailbreak and infection is the mobile device’s passcode. However, if the device is unlocked while connected to the infected computer, it can be infected by the attacker.”

According to the report, the RCS mobile Trojans are capable of performing a variety of surveillance functions, including reporting the target’s location, taking photos, copying events from the device’s calendar, and registering new SIM cards inserted in the infected device. It can also intercept phone calls and SMS messages, including chat messages sent from specific applications such as Viber, WhatsApp and Skype.

The security firm said that it used “special indicators and connectivity data” obtained by reverse engineering existing samples to map out more than 320 RCS C&C servers in more than 40 countries.

The majority of the servers were found in the United States, Kazakhstan, Ecuador, the United Kingdom and Canada.

“The presence of these servers in a given country doesn’t mean to say they are used by that particular country’s law enforcement agencies,” said Golovanov. “However, it makes sense for the users of RCS to deploy C&Cs in locations they control – where there are minimal risks of cross-border legal issues or server seizures.”

“The new data we are publishing on HackingTeam’s RCS is extremely important because it shows the level of sophistication and scale of these surveillance tools,” Kaspersky concluded.

The full report from Kaspersky Lab is available online.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.