Description

A previously undocumented Android spyware, dubbed EagleMsgSpy, has been identified and is believed to be used by Chinese law enforcement agencies for mobile device surveillance. According to Lookout researchers, the spyware has been operational since at least 2017 and was developed by Wuhan Chinasoft Token Information Technology Co., Ltd. The report provides extensive evidence linking EagleMsgSpy to its developers and operators. This includes IP addresses tied to command-and-control (C2) servers, references in internal documentation, and domains associated with the company and public security bureaus. While researchers suspect the existence of an iOS version, they have not yet obtained a sample for analysis. EagleMsgSpy is installed manually, likely when law enforcement gains physical access to unlocked devices, such as during arrests. The spyware is not distributed via Google Play or third-party app stores, suggesting its use is limited to specific operators. The malware is capable of extensive data theft, including chat messages (e.g., QQ, Telegram, WhatsApp), call logs, SMS, contacts, GPS location, network activity, and browser bookmarks. It also performs screen recording, takes screenshots, and collects audio recordings. Data is encrypted, compressed, and temporarily stored in a hidden directory before being exfiltrated to C2 servers. EagleMsgSpy features a sophisticated admin panel, dubbed the "Stability Maintenance Judgment System," allowing operators to trigger real-time actions like audio recording or monitoring communication patterns. Lookout's investigation ties the spyware to public security bureaus in Yantai, Dengfeng, and Guiyang, highlighting its use in state-level surveillance. The admin panel's name further suggests systematic government use.