{"id":22516,"date":"2024-03-21T15:43:39","date_gmt":"2024-03-21T19:43:39","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/commercial-spyware\/22516\/"},"modified":"2024-03-22T13:53:02","modified_gmt":"2024-03-22T09:53:02","slug":"commercial-spyware","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/commercial-spyware\/22516\/","title":{"rendered":"The most notorious instances of commercial spyware"},"content":{"rendered":"<p>Commercial spyware has of late been making the headlines with increasing frequency. And we\u2019re not just talking about media channels dedicated to IT or cybersecurity; reports on commercial spyware have been appearing regularly in mainstream media for some time now.<\/p>\n<p>In this post, we discuss the existing commercial spyware packages, how they operate, what they\u2019re capable of, and why they\u2019re dangerous. And as always, we finish with advice on how to defend against them.<\/p>\n<h2>What is commercial spyware?<\/h2>\n<p>\nLet\u2019s start with a definition. Commercial spyware is legal malware created by private companies and designed to conduct targeted surveillance and collect sensitive data from users\u2019 devices. The standard tasks of commercial spyware include stealing messages, eavesdropping on calls, and tracking location.<\/p>\n<p>To install commercial spyware on a victim\u2019s device, attackers often use zero-day vulnerabilities, and in many cases \u2014 zero-click exploits, which make infection possible without requiring any action on the part of the victim.<\/p>\n<p>Spyware always tries to be as inconspicuous as possible, for the longer the victim remains unaware of the infection, the more information attackers can gather. Moreover, commercial spyware often includes tools for removing traces of infection, so victims may not even suspect afterward that someone was monitoring them.<\/p>\n<p>Although commercial spyware is developed by private companies, they typically sell it to various government organizations \u2014 primarily law enforcement and other security agencies.<\/p>\n<p>As a result, commercial spyware is used, among other things, to monitor civilian activists, journalists, and other non-criminal individuals. In fact, that\u2019s exactly why spyware programs regularly make the headlines.<\/p>\n<h2>1. Pegasus \u2014 NSO Group<\/h2>\n<p><strong>Targeted OS:<\/strong><\/p>\n<p> iOS, Android<\/p>\n<p><strong>Zero-day vulnerability exploitation:<\/strong> Apple iOS, Apple Safari, WhatsApp, Apple iMessage<\/p>\n<p><strong>Zero-click exploit use:<\/strong> yes<\/p>\n<p><strong>Country of origin:<\/strong> Israel<\/p>\n<p><strong>Alternative names:<\/strong> Chrysaor, DEV-0336, Night Tsunami<\/p>\n<p>Now let\u2019s talk about specific companies, starting with the most prominent player in the commercial spyware market \u2014 the notorious Israeli NSO Group, developer of the iOS spyware Pegasus, and its <a href=\"https:\/\/info.lookout.com\/rs\/051-ESQ-475\/images\/lookout-pegasus-android-technical-analysis.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Android version<\/a> Chrysaor. The early version of Pegasus, <a href=\"https:\/\/info.lookout.com\/rs\/051-ESQ-475\/images\/lookout-pegasus-technical-analysis.pdf\" target=\"_blank\" rel=\"nofollow noopener\">discovered<\/a> in 2016, required the victim to click on a sent link, which opened a malicious page in a browser, which in turn triggered an automatic infection mechanism using the Trident exploit.<\/p>\n<div id=\"attachment_50814\" style=\"width: 909px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234557\/commercial-spyware-11.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50814\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234557\/commercial-spyware-11.jpg\" alt=\"How Pegasus attacks were conducted in 2016\" width=\"899\" height=\"357\" class=\"size-full wp-image-50814\"><\/a><p id=\"caption-attachment-50814\" class=\"wp-caption-text\">How Pegasus attacks were conducted in 2016. <a href=\"https:\/\/citizenlab.ca\/2016\/08\/million-dollar-dissident-iphone-zero-day-nso-group-uae\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The ability to infect iPhones using zero-click exploits quickly became a hallmark of Pegasus. For example, a few years ago, an attack on Apple smartphones exploited a <a href=\"https:\/\/www.ft.com\/content\/4da1117e-756c-11e9-be7d-6d846537acab\" target=\"_blank\" rel=\"nofollow noopener\">vulnerability in WhatsApp voice calls<\/a> activated with a series of malicious packets. The vulnerability, in turn, enabled remote code execution on the targeted device.<\/p>\n<p>The FORCEDENTRY exploit, <a href=\"https:\/\/citizenlab.ca\/2021\/09\/forcedentry-nso-group-imessage-zero-click-exploit-captured-in-the-wild\/\" target=\"_blank\" rel=\"nofollow noopener\">discovered<\/a> by Citizen Lab in 2021 and <a href=\"https:\/\/googleprojectzero.blogspot.com\/2021\/12\/a-deep-dive-into-nso-zero-click.html\" target=\"_blank\" rel=\"nofollow noopener\">thoroughly researched<\/a> by the Google Project Zero team, is the most notorious. It was designed to attack the Apple iMessage system, enabling spyware to be launched on the victim\u2019s iPhone after sending them a message containing a GIF file.<\/p>\n<p>However, this file wasn\u2019t an animated image at all but rather an infected PDF document in which a compression algorithm was used. When the victim\u2019s smartphone attempted to preview the document, a vulnerability in the program responsible for handling this compression algorithm was triggered, leading to execution of a chain of exploits and, ultimately, infection of the device.<\/p>\n<p>After this exploit was discovered, Apple patched the vulnerabilities. However, as it later turned out, NSO Group simply moved on to exploit vulnerabilities in other applications as if nothing had happened. In April 2023, the same Citizen Lab published <a href=\"https:\/\/citizenlab.ca\/2023\/04\/nso-groups-pegasus-spyware-returns-in-2022\/\" target=\"_blank\" rel=\"nofollow noopener\">research on the FINDMYPWN and PWNYOURHOME exploits<\/a>. The former was linked to a vulnerability in Apple\u2019s Find My app, while the latter targeted its HomeKit. However, the ultimate target for both of these exploits was the same: the iMessage messaging system.<\/p>\n<div id=\"attachment_50815\" style=\"width: 1346px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234607\/commercial-spyware-12.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50815\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234607\/commercial-spyware-12.jpg\" alt=\"Lockdown Mode messages during the PWNYOURHOME exploit attack\" width=\"1336\" height=\"890\" class=\"size-full wp-image-50815\"><\/a><p id=\"caption-attachment-50815\" class=\"wp-caption-text\">Lockdown Mode messages about blocking PWNYOURHOME exploit attacks. <a href=\"https:\/\/citizenlab.ca\/2023\/04\/nso-groups-pegasus-spyware-returns-in-2022\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Finally, in September 2023, Citizen Lab released information about another exploit used by NSO Group: <a href=\"https:\/\/citizenlab.ca\/2023\/09\/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild\/\" target=\"_blank\" rel=\"nofollow noopener\">BLASTPASS<\/a>. This exploit works similarly \u2014 also activating a vulnerability in iMessage \u2014 but this time related to the mechanism for sending Apple Wallet objects, such as event tickets, in messages.<\/p>\n<p>Regardless of the specific attack vector, infection results in attackers gaining access to the victim\u2019s messages, intercepting calls, stealing passwords, and tracking location. The geographical reach of this spyware is massive \u2014 and the corresponding section of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pegasus_(spyware)\" target=\"_blank\" rel=\"nofollow noopener\">Pegasus Wikipedia entry<\/a> occupies an impressive amount of space.<\/p>\n<h2>2. DevilsTongue, Sherlock \u2014 Candiru<\/h2>\n<p><strong>Targeted OS:<\/strong><\/p>\n<p> Windows, macOS, iOS, Android<\/p>\n<p><strong>Zero-day vulnerability exploitation:<\/strong> Microsoft Windows, Google Chrome<\/p>\n<p><strong>Zero-click exploit use:<\/strong> likely<\/p>\n<p><strong>Country of origin:<\/strong> Israel<\/p>\n<p><strong>Alternative names:<\/strong> SOURGUM, Caramel Tsunami, Saito Tech Ltd.<\/p>\n<p>Another Israeli company that develops commercial spyware is Candiru, founded in 2014. In fact, this is only the first of the various names this cyber-espionage organization have used. Since they constantly change their moniker, it\u2019s likely they\u2019re working under a different one now. It\u2019s known that Candiru is backed by several investors <a href=\"https:\/\/citizenlab.ca\/2021\/07\/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus\/\" target=\"_blank\" rel=\"nofollow noopener\">associated with NSO Group<\/a>. However, unlike NSO Group, Candiru is <a href=\"https:\/\/www.haaretz.com\/middle-east-news\/2019-01-04\/ty-article\/.premium\/top-secret-israeli-cyberattack-firm-revealed\/0000017f-e36d-d38f-a57f-e77ff84b0000\" target=\"_blank\" rel=\"nofollow noopener\">much more secretive<\/a>: the company has no website, its employees are forbidden to mention their employer on LinkedIn, and in the building where Candiru has its office, you won\u2019t find any mention of it.<\/p>\n<div id=\"attachment_50816\" style=\"width: 1948px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234623\/commercial-spyware-21.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50816\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234623\/commercial-spyware-21.jpg\" alt=\"Candiru regularly changes its official names\" width=\"1938\" height=\"732\" class=\"size-full wp-image-50816\"><\/a><p id=\"caption-attachment-50816\" class=\"wp-caption-text\">Official names changed by Candiru from 2014 to 2022. <a href=\"https:\/\/citizenlab.ca\/2021\/07\/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Candiru\u2019s activities have not been thoroughly studied yet \u2014 all the information we have is limited to leaked documents and a couple of incident investigations involving spyware developed by this company. For example, Microsoft\u2019s investigation <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/07\/15\/protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware\/\" target=\"_blank\" rel=\"nofollow noopener\">uncovered<\/a> several zero-day vulnerabilities in the Windows operating system that Candiru exploited. There were also <a href=\"https:\/\/blog.google\/threat-analysis-group\/how-we-protect-users-0-day-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">several zero-days in the Google Chrome browser<\/a>, which Candiru probably exploited as well.<\/p>\n<p>The company\u2019s spyware is called DevilsTongue, and has multiple attack vectors \u2014 from hacking devices with physical access and using the man-in-the-middle method, to spreading malicious links and infected MS Office documents.<\/p>\n<div id=\"attachment_50817\" style=\"width: 1652px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234635\/commercial-spyware-22.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50817\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234635\/commercial-spyware-22.jpg\" alt=\"Description of the capabilities of Candiru's spyware\" width=\"1642\" height=\"464\" class=\"size-full wp-image-50817\"><\/a><p id=\"caption-attachment-50817\" class=\"wp-caption-text\">Capabilities of the DevilsTongue spyware developed by Candiru. <a href=\"https:\/\/citizenlab.ca\/2021\/07\/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Candiru also offers a spy tool called Sherlock, which the researchers at Citizen Lab say could be a platform for zero-click attacks on various operating systems \u2014 Windows, iOS, and Android. Furthermore, there are reports that Candiru was <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2019\/10\/03\/meet-candiru-the-super-stealth-cyber-mercenaries-hacking-apple-and-microsoft-pcs-for-profit\/?sh=6f736ccf5a39\" target=\"_blank\" rel=\"nofollow noopener\">developing spyware for attacks on macOS<\/a>.<\/p>\n<h2>3. Alien, Predator \u2014 Cytrox \/ Intellexa<\/h2>\n<p><strong>Targeted OS:<\/strong><\/p>\n<p> Android, iOS<\/p>\n<p><strong>Zero-day vulnerability exploitation:<\/strong> Google Chrome, Google Android, Apple iOS<\/p>\n<p><strong>Zero-click exploit use:<\/strong> no (but something similar where the Mars complex is used)<\/p>\n<p><strong>Country of origin:<\/strong> North Macedonia \/ Cyprus<\/p>\n<p><strong>Alternative names:<\/strong> Helios, Balinese Ltd., Peterbald Ltd.<\/p>\n<p>Alien is one of the two components of this spyware. It\u2019s responsible for hacking the targeted device and installing the second part \u2014 necessary for setting up surveillance. This second part is called Predator \u2014 in homage to the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Alien_vs._Predator_(film)\" target=\"_blank\" rel=\"nofollow noopener\">movie<\/a>.<\/p>\n<p>The spyware was initially developed by Cytrox, founded in 2017. Its roots are in North Macedonia, with related subsidiary companies registered in both Israel and Hungary. Cytrox was later <a href=\"https:\/\/blog.talosintelligence.com\/mercenary-intellexa-predator\/\" target=\"_blank\" rel=\"nofollow noopener\">acquired<\/a> by Cyprus-registered Intellexa, a company owned by Tal Dilian, who <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2019\/08\/05\/a-multimillionaire-surveillance-dealer-steps-out-of-the-shadows-and-his-9-million-whatsapp-hacking-van\/?sh=2857b0fd31b7\" target=\"_blank\" rel=\"nofollow noopener\">served<\/a> 24 years in high-ranking positions in Israeli military intelligence.<\/p>\n<p>The Alien\/Predator spyware focuses on attacks on both the Android and iOS operating systems. According to last year\u2019s <a href=\"https:\/\/blog.google\/threat-analysis-group\/protecting-android-users-from-0-day-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">Google Threat Analysis Group study<\/a>, the developers of the Android version of Alien utilized several exploit chains \u2014 including four zero-day vulnerabilities in Google Chrome and one in Android.<\/p>\n<p>Alien\/Predator attacks started with messages to victims containing malicious links. Once clicked, these links directed victims to the attackers\u2019 website, which exploited the vulnerabilities in the browser (Chrome) and OS (Android) to infect the device. It then immediately redirected the victim to a legitimate page to avoid suspicion.<\/p>\n<p>Intellexa also offers the <a href=\"https:\/\/www.darkreading.com\/endpoint-security\/operation-behind-predator-mobile-spyware-industrial-scale\" target=\"_blank\" rel=\"nofollow noopener\">Mars spyware suite<\/a> \u2014 part of which is installed on the victim\u2019s mobile-operator\u2019s side. Once installed, Mars waits for the targeted individual to visit an HTTP page, and when they do they use the man-in-the-middle method to redirect the victim to the infected site \u2014 at which point the process described in the previous paragraph triggers.<\/p>\n<p>Infection by the Predator spyware using Mars occurs without any action on the part of the victim. This resembles a zero-click attack; however, in this case, additional equipment is used instead of vulnerabilities.<\/p>\n<h2>4. Subzero \u2014 DSIRF<\/h2>\n<p><strong>Targeted OS:<\/strong><\/p>\n<p> Windows<\/p>\n<p><strong>Zero-day vulnerability exploitation:<\/strong> Microsoft Windows, Adobe Reader<\/p>\n<p><strong>Zero-click exploit use:<\/strong> no<\/p>\n<p><strong>Country of origin:<\/strong> Austria<\/p>\n<p><strong>Alternative names:<\/strong> KNOTWEED, Denim Tsunami, MLS Machine Learning Solutions GmbH<\/p>\n<p>The spyware Subzero, developed by the lengthily-named Austrian company DSR Decision Supporting Information Research Forensic GmbH (DSIRF), was first picked up by the German-speaking press back in <a href=\"https:\/\/www.focus.de\/politik\/vorab-aus-dem-focus-volle-kontrolle-ueber-zielcomputer-das-raetsel-um-die-spionage-app-fuehrt-ueber-wirecard-zu-putin_id_24442733.html\" target=\"_blank\" rel=\"nofollow noopener\">2021<\/a>. However, it wasn\u2019t until a year later that this spyware truly gained notoriety. In July 2022, the Microsoft Threat Intelligence team released a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/07\/27\/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits\/\" target=\"_blank\" rel=\"nofollow noopener\">detailed study of spyware<\/a> used by a group codenamed KNOTWEED (Denim Tsunami), which the researchers identified as DSIRF Subzero.<\/p>\n<div id=\"attachment_50818\" style=\"width: 1526px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234651\/commercial-spyware-41.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50818\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234651\/commercial-spyware-41.jpg\" alt=\"DSIRF Subzero malware capabilities\" width=\"1516\" height=\"1314\" class=\"size-full wp-image-50818\"><\/a><p id=\"caption-attachment-50818\" class=\"wp-caption-text\">Slides from a DSIRF presentation detailing the capabilities of the spyware Subzero. <a href=\"https:\/\/cdn.netzpolitik.org\/wp-upload\/2021\/12\/2018-08-28_DSIRF_Company-Profile-Gov.redacted.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>To compromise targeted systems, the Subzero malware exploited several zero-day vulnerabilities in both Windows and Adobe Reader. The attack vector typically involved sending the victim an email containing a malicious PDF file, which triggered a chain of exploits upon opening. As a result, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/bodiless-malware\/\" target=\"_blank\" rel=\"noopener\">bodiless<\/a> spyware was launched on the victim\u2019s device.<\/p>\n<p>In the next stage, the spyware collected any passwords and other authentication credentials it could find in the infected system \u2014 from browsers, email clients, the Local Security Authority Subsystem Service (LSASS), and the Windows password manager. Presumably, these credentials were later used to gather information about the victim and set up further surveillance.<\/p>\n<p>According to the researchers, the Subzero malware has been used to attack organizations in Europe and Central America since at least 2020. The researchers also noted that DSIRF not only sold spyware but also arranged for its employees to participate in the attacks.<\/p>\n<p>In August 2023, it was announced that <a href=\"https:\/\/www.linkedin.com\/posts\/jeremydallman_wiener-spionagesoftwarefirma-dsirf-schlie%C3%9Ft-activity-7061733888867389440-w95B\/\" target=\"_blank\" rel=\"nofollow noopener\">DSIRF would be shutting down<\/a>. But it\u2019s too early to rejoice just yet: it\u2019s possible that cyber-espionage activities <a href=\"https:\/\/www.intelligenceonline.com\/surveillance--interception\/2023\/08\/28\/targeted-for-russian-ties-cyber-intelligence-firm-dsirf-shuts-up-shop,110036360-art\" target=\"_blank\" rel=\"nofollow noopener\">will be continued<\/a> by DSIRF\u2019s subsidiary \u2014 MLS, Machine Learning Solutions \u2014 which is <a href=\"https:\/\/www.derstandard.at\/story\/2000138083279\/die-spionage-software-und-die-ehrwuerdige-stiftung-eine-raetselhafte-zusammenarbeit\" target=\"_blank\" rel=\"nofollow noopener\">believed<\/a> to be the current owner of the Subzero spyware. By the way, the MLS website is still fully operational \u2014 unlike the DSIRF page, which was \u201cunder maintenance\u201d at the time of writing.<\/p>\n<h2>5. Heliconia \u2014 Variston IT<\/h2>\n<p><strong>Targeted OS:<\/strong><\/p>\n<p> Windows, Linux<\/p>\n<p><strong>Zero-day vulnerability exploitation:<\/strong> Microsoft Defender, Google Chrome, Mozilla Firefox<\/p>\n<p><strong>Zero-click exploit use:<\/strong> no<\/p>\n<p><strong>Country of origin:<\/strong> Spain<\/p>\n<p><strong>Alternative names:<\/strong> none<\/p>\n<p>Also in 2022, around the same time Microsoft published details about Subzero\u2019s activities, Google <a href=\"https:\/\/blog.google\/threat-analysis-group\/new-details-on-commercial-spyware-vendor-variston\/\" target=\"_blank\" rel=\"nofollow noopener\">presented its research<\/a> analyzing another type of commercial spyware \u2014 Heliconia. The Google Threat Analysis Group (TAG) report described three components of this malware designed for attacks on computers running Windows or Linux.<\/p>\n<p>The first part \u2014 called Heliconia Noise \u2014 exploits a vulnerability in the Google Chrome V8 JavaScript engine. Following its exploitation, Chrome\u2019s sandbox is bypassed, and the spyware launches in the targeted system. Additionally, in the code of this part, a fragment was found mentioning Variston as the malware developer. The Google researchers believe it references the Spanish company Variston IT. This company specializes in providing information security services.<\/p>\n<div id=\"attachment_50819\" style=\"width: 1610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234703\/commercial-spyware-51.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50819\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234703\/commercial-spyware-51.jpg\" alt=\"Link to Variston IT in Heliconia code\" width=\"1600\" height=\"716\" class=\"size-full wp-image-50819\"><\/a><p id=\"caption-attachment-50819\" class=\"wp-caption-text\">Researchers discovered a link to a company named Variston in the Heliconica code. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-discovers-windows-exploit-framework-used-to-deploy-spyware\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The second part of the spyware suite, which the Google researchers dubbed Heliconia Soft, exploits a vulnerability in the JavaScript engine embedded in the Windows antivirus, Microsoft Defender. This works as follows: first, the victim is sent a link to an infected PDF file containing malicious JavaScript code. This code triggers the Microsoft Defender vulnerability when the automatic scan of the downloaded PDF file starts. As a result of exploiting this vulnerability, Heliconia gains OS-level privileges and the ability to install spyware on the victim\u2019s computer.<\/p>\n<p>The third part is called Helicona Files. It exploits a vulnerability in the <a href=\"https:\/\/en.wikipedia.org\/wiki\/XSLT\" target=\"_blank\" rel=\"nofollow noopener\">XSLT processor<\/a> of the Mozilla Firefox browser to attack computers running Windows or Linux. Judging by this vulnerability, which affects Firefox versions 64 through 68, the spyware was developed quite some time ago and has been in use since at least 2018.<\/p>\n<h2>6. Reign \u2014 QuaDream<\/h2>\n<p><strong>Targeted OS:<\/strong><\/p>\n<p> iOS<\/p>\n<p><strong>Zero-day vulnerability exploitation:<\/strong> Apple iOS<\/p>\n<p><strong>Zero-click exploit use:<\/strong> yes<\/p>\n<p><strong>Country of origin:<\/strong> Israel \/ Cyprus<\/p>\n<p><strong>Alternative names:<\/strong> DEV-0196, Carmine Tsunami, InReach<\/p>\n<p>QuaDream is another Israeli company that develops spyware called Reign. It was founded by former employees of NSO Group, and the spyware they\u2019ve created bears a striking resemblance to Pegasus. For example, to infect iPhones with Reign spyware, they utilize a zero-click exploit similar to FORCEDENTRY, described above.<\/p>\n<p>Citizen Lab researchers have <a href=\"https:\/\/citizenlab.ca\/2023\/04\/spyware-vendor-quadream-exploits-victims-customers\/\" target=\"_blank\" rel=\"nofollow noopener\">dubbed this exploit ENDOFDAYS<\/a>. Apparently, this exploit utilizes vulnerabilities in iCloud Calendar as the initial attack vector, enabling attackers to discreetly infect an iPhone by sending invisible malicious invitations to the calendar.<\/p>\n<p>As for the spying capabilities of the iOS version of Reign, the list looks impressive:\n<\/p>\n<ul>\n<li>searching files and databases<\/li>\n<li>recording calls<\/li>\n<li>listening through the microphone<\/li>\n<li>taking photos with either front or rear cameras<\/li>\n<li>stealing passwords<\/li>\n<li>generating iCloud two-factor authentication one-time codes<\/li>\n<li>tracking location<\/li>\n<li>erasing traces of device infection<\/li>\n<\/ul>\n<div id=\"attachment_50820\" style=\"width: 1044px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234720\/commercial-spyware-61.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50820\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/21234720\/commercial-spyware-61.jpg\" alt=\"QuaDream Reign spyware capabilities\" width=\"1034\" height=\"1088\" class=\"size-full wp-image-50820\"><\/a><p id=\"caption-attachment-50820\" class=\"wp-caption-text\">Capabilities of the sample iOS version of the QuaDream Reign spyware analyzed by Citizen Lab <a href=\"https:\/\/citizenlab.ca\/2023\/04\/spyware-vendor-quadream-exploits-victims-customers\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>According to some reports, QuaDream has also developed malware for attacking Android devices, but there\u2019s no publicly available information about it. QuaDream\u2019s penchant for secrecy is similar to that of Candiru. QuaDream also lacks a website, its employees are prohibited from discussing their work on social media, and the company\u2019s office can\u2019t be found on Google Maps.<\/p>\n<p>Interestingly, QuaDream used an intermediary, the Cypriot company InReach, to sell its products. The relationship between these two companies is very complicated; at one point, they even <a href=\"https:\/\/www.intelligenceonline.com\/surveillance--interception\/2021\/06\/25\/quadream-and-inreach-slog-it-out-in-court-even-as-business-booms,109675583-art\" target=\"_blank\" rel=\"nofollow noopener\">went to court<\/a>. In April 2023, shortly after publication of the Citizen Lab investigation into QuaDream, the <a href=\"https:\/\/www.haaretz.com\/israel-news\/security-aviation\/2023-04-16\/ty-article\/.premium\/offensive-israeli-cyber-firm-quadream-closes-and-fires-all-employees\/00000187-8b5c-d484-adef-ebdc048c0000\" target=\"_blank\" rel=\"nofollow noopener\">company suddenly announced cessation of its operations<\/a>; however, it\u2019s not entirely clear yet whether this is a complete surrender or a tactical retreat.<\/p>\n<h2>How to defend against commercial spyware<\/h2>\n<p>\nEnsuring full protection against attacks using commercial spyware is generally challenging. However, you can at least make life harder for potential attackers. Follow these recommendations:<\/p>\n<ul>\n<li>Regularly <a href=\"https:\/\/www.kaspersky.com\/blog\/patching-priorities\/48867\/\" target=\"_blank\" rel=\"noopener nofollow\">update<\/a> the software on all your devices. First and foremost: operating systems, browsers, and messaging apps<\/li>\n<li>\n<a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/\" target=\"_blank\" rel=\"noopener nofollow\">Do not click<\/a> on suspicious links \u2014 one visit to a site may be enough to infect your device<\/li>\n<li>Use a VPN to mask your internet traffic \u2014 this will protect you from being redirected to a malicious site while browsing HTTP pages<\/li>\n<li>Reboot regularly. Often, spyware can\u2019t persist in an infected system indefinitely, so rebooting helps get rid of it<\/li>\n<li>Install <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">a reliable security solution<\/a> on all your devices<\/li>\n<li>And of course, read security expert Costin Raiu\u2019s post for more tips on <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-pegasus-spyware\/43453\/\" target=\"_blank\" rel=\"noopener nofollow\">how to protect yourself from Pegasus and similar spyware<\/a>\n<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Commercial spyware \u2014 what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.<\/p>\n","protected":false},"author":2726,"featured_media":22519,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[1761,1268,1831,682,738,521,268,2710],"class_list":{"0":"post-22516","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-cyberattacks","10":"tag-exploits","11":"tag-pegasus","12":"tag-spyware","13":"tag-surveillance","14":"tag-threats","15":"tag-vulnerabilities","16":"tag-zero-click"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/commercial-spyware\/22516\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/commercial-spyware\/27208\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/commercial-spyware\/29884\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/commercial-spyware\/27383\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/commercial-spyware\/37149\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/commercial-spyware\/50813\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/commercial-spyware\/27569\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/commercial-spyware\/33390\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/commercial-spyware\/33017\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/spyware\/","name":"spyware"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22516"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22516\/revisions"}],"predecessor-version":[{"id":22521,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22516\/revisions\/22521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22519"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}