A previously undocumented Android spyware, dubbed EagleMsgSpy, has been identified and is believed to be used by Chinese law enforcement agencies for mobile device surveillance. According to Lookout researchers, the spyware has been operational since at least 2017 and was developed by Wuhan Chinasoft Token Information Technology Co., Ltd. The report provides extensive evidence linking EagleMsgSpy to its developers and operators. This includes IP addresses tied to command-and-control (C2) servers, references in internal documentation, and domains associated with the company and public security bureaus. While researchers suspect the existence of an iOS version, they have not yet obtained a sample for analysis. EagleMsgSpy is installed manually, likely when law enforcement gains physical access to unlocked devices, such as during arrests. The spyware is not distributed via Google Play or third-party app stores, suggesting its use is limited to specific operators. The malware is capable of extensive data theft, including chat messages (e.g., QQ, Telegram, WhatsApp), call logs, SMS, contacts, GPS location, network activity, and browser bookmarks. It also performs screen recording, takes screenshots, and collects audio recordings. Data is encrypted, compressed, and temporarily stored in a hidden directory before being exfiltrated to C2 servers. EagleMsgSpy features a sophisticated admin panel, dubbed the "Stability Maintenance Judgment System," allowing operators to trigger real-time actions like audio recording or monitoring communication patterns. Lookout's investigation ties the spyware to public security bureaus in Yantai, Dengfeng, and Guiyang, highlighting its use in state-level surveillance. The admin panel's name further suggests systematic government use.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...