Tuesday, November 12, 2024
Homecyber securityLightSpy iOS Malware Enhanced with 28 New Destructive Plugins

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

Published on

Malware protection

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices. The malware’s core binaries were even signed with the same certificate used in jailbreak kits, indicating deep integration.

The C2 servers, active until October 26, 2022, hosted outdated malware, possibly for demonstration purposes but not as MaaS.

The iOS and macOS versions, while sharing core functions, differed in post-exploitation and privilege escalation techniques due to platform variations.

- Advertisement - SIEM as a Service
attack chain

It exploited the CVE-2020-9802 vulnerability to gain access to the target device, which was fixed in iOS 13.5, but the threat actor bypassed CVE-2020-9870 and CVE-2020-9910, which were patched in iOS 13.6.

Protecting Your Networks & Endpoints With UnderDefense MDR – Request Free Demo

By deploying a Mach-O binary executable, the exploit took advantage of a vulnerability known as CVE-2020-3837, which ultimately led to a jailbreak.

The jailbroken device downloaded and executed the FrameworkLoader, which further downloaded and executed the LightSpy Core and plugins, while the Core established communication with the C2 server for further malicious activities.

GitHub jailbreak kit project

LightSpy iOS Implant is a multi-part archive containing a core library (LightSpy Core) and multiple plugins, which relies on jailbreak functionalities and communicates with the C2 server.

The network communication, database access, and archive extraction are all accomplished through the utilization of a variety of libraries.

After establishing a C2 connection, LightSpy Core parses configuration and distributes tasks to plugins, where the Core itself can play sounds and utilizes a network stack to communicate with plugins.

It offers various plugins for data exfiltration (contacts, messages, app data), location tracking, screen capturing, and even destructive actions like disabling boot up or deleting files.

signcert.p12 thumbprint

The threat actors utilized self-signed certificates to establish infrastructure on IP address 103.27.109.217.

Open-source intelligence revealed multiple servers sharing this certificate. By sending GET requests to specific IP addresses and ports, researchers identified servers connected to the iOS campaign.

Threat Fabric’s investigation uncovered five key IP addresses associated with the campaign, two of which hosted administration panels.

only 222.219.183[.]84 had a working panel

While analysis based on source code file paths within the downloaded binaries suggests at least three developers worked on the LightSpy iOS project: two focused on plugin development and a lead developer responsible for the Core and privilege escalation components.

Xcode automatically inserts user and organization names into header files, which helped identify these developers.

File path variations within the same user account suggest possible use of multiple machines by the same developer.

The LightSpy iOS case reveals a sophisticated threat actor leveraging zero-day and one-day exploits to compromise devices, particularly those hindered by regional restrictions.

The attackers employ destructive capabilities to erase traces and demonstrate their tool’s potential, while the discovery of a location plugin tied to a Chinese-specific system strongly suggests Chinese origins.

To mitigate risks, users are advised to keep devices updated, reboot regularly to disrupt persistent attacks, and exercise caution in regions with restricted software updates.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...