All about KoSpy: the Korean spyware that steals data on Android

  • KoSpy is a North Korean spyware detected on Google Play and third-party stores.
  • It hides in fake apps that collect personal data and send it to remote servers.
  • The malware has advanced capabilities to record audio, steal files, and log keystrokes.
  • It is recommended to download apps only from trusted sources and use additional security measures.

KoSpi, the malware developed in North Korea

A new malware has been identified infecting Android devices through fraudulent applications on the Google Play Store and third-party stores. KoSpy, a spyware developed by hackers linked to the North Korean government, with advanced capabilities to steal user information without detection.

This spyware has raised concerns in the cybersecurity community, as it manages to infiltrate victims' devices through seemingly harmless applications. Here's how it works, what information it steals, and what you can do to protect yourself.

What is KoSpy and how does it infect Android devices?

Researchers at Lookout have discovered that KoSpy It hides in fake apps that appear to be legitimate file management or security programs. These apps were even available on the official Google Play Store, demonstrating that they managed to evade Google's security filters.

How to activate incognito mode on WhatsApp
Related article:
How to know if you're being monitored on WhatsApp and the ultimate guide to avoiding it

Once downloaded and installed, these apps activate the KoSpy spyware without the user noticing. While some of these apps had basic functionality that made them appear legitimate, their real purpose was to collect sensitive information from the device and send it to servers in North Korea. Therefore, it is vital protect your device from malware.

KoSpi: the malware that steals data from your Android

Popular Apps with KoSpy

The following apps have been identified as carrying the spyware:

  • 휴대폰 관리자 (Phone Manager)
  • File Manager
  • 스마트 관리자 (Smart Manager)
  • Kakao Security
  • Software Update Utility

If you have ever downloaded any of these applications, it is recommended that you delete them immediately and perform a security scan on your device, as well as check How to remove the green dot on Samsung phones, in case any of these applications have left a trace.

What information does KoSpy steal?

This spyware is highly sophisticated and can obtain a large amount of data from the infected device. Its capabilities include:

  • Interception of SMS messages and call logs.
  • GPS location to track the user's location in real time.
  • File access and folders stored on the phone.
  • Audio recording and taking photographs without consent.
  • Screenshot and real-time recording of user activity.
  • Keystroke logging to steal login credentials.
  • List installed applications and get details of the Wi-Fi networks used.

All of this data is sent to command and control servers operated by hackers affiliated with the North Korean government.

How this malware can evade detection

One of the most advanced features of KoSpy is its ability to remain hiddenTo do this, it employs multiple evasion techniques:

do stealing
Related article:
How to know if your phone is being spied on: signs, methods, analysis, and total protection
"]
  • Using Firebase Firestore to receive settings and activate certain functions remotely.
  • Wait for a specific date before being activated, avoiding detection in initial security scans.
  • Check if it is being executed in an analysis environment as an emulator, and in that case, automatically disable itself.
  • Dynamically change your command and control servers to evade blocking.

Thanks to these strategies, spyware can operate for long periods without being detected. This highlights the importance of following appropriate security measures and staying abreast of cybersecurity-related news, such as those found in The controversial EU plan to scan WhatsApp.

KoSpy's relationship with North Korea

The hacker group responsible for KoSpy is linked to ScarCruft (APT37), a North Korean state-sponsored cyberespionage organization. This infrastructure has also been found to have been used by other groups such as APT43 (Kimsuky), suggesting cooperation in the development and deployment of spy tools.

ScarCruft has been active since 2012 and has been attributed to multiple attacks primarily targeting South Korea, although victims have also been found in countries such as Japan, India, Russia and Middle Eastern nations. These types of cyberattacks put many users at risk who may not be aware of how how can they hack your mobile.

How to protect yourself from this and other spyware

To avoid falling victim to these types of threats, cybersecurity experts recommend following these preventive measures:

  • Download apps only from trusted sources, avoiding third-party stores like APKPure.
  • check permissions that an app asks for before installing it. If it asks for access to unnecessary features, it's best not to install it.
  • Regularly update the operating system and applications to close possible vulnerabilities.
  • Use a trusted antivirus on the mobile device to detect threats.
  • Immediately uninstall any suspicious applications and perform a security analysis.

If you suspect your device may be infected, it's recommended to perform a factory reset to remove any malware.

How to know if your mobile is being spied on: Tips and tricks to detect it
Related article:
How to Tell if Your Phone Is Being Spyed on: Key Signs, Detection Methods, and a Complete Protection Guide

KoSpy is a clear example of how malware is constantly evolving and can even sneak into official stores like Google Play. Stay informed and apply good cybersecurity practices remains the best defense against these threats. Share this guide and learn how to protect your Android devices from malware..


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.