home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,525 of 2,445   
   Mike Powell to All   
   Beware Iran-linked fake   
   23 Jul 25 09:17:29   
   
   TZUTC: -0500   
   MSGID: 1258.consprcy@1:2320/105 2ce629e3   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Beware of Iran-linked fake VPN apps found to spy on Android users   
      
   Date:   
   Tue, 22 Jul 2025 16:17:07 +0000   
      
   Description:   
   While VPN demand has soared across Iran since June 13, researchers discovered   
   a new Android spyware campaign starting one week after the Israel-Iran   
   conflict began.   
      
   FULL STORY   
      
   Researchers have discovered a new Iran-linked spyware campaign that mostly   
   targets Android VPN users.    
      
   The team at security software provider, Lookout, found a new version of   
   DCHSpy, an Android spyware that masquerades as legitimate VPN apps or other   
   applications. This includes Starlink, a satellite internet connection service   
   offered by SpaceX.    
      
   The malware campaign, according to experts' findings , was deployed by the   
   hacking group MuddyWater only a week after the Israel-Iran conflict began   
   exactly when VPN demand skyrocketed in Iran as citizens looked for ways to   
   bypass new internet restrictions. DCHSpy 2025  what are the risk? A virtual   
   private network (VPN) is security software that encrypts all internet   
   connections while spoofing a user's real IP address location. The latter    
   skill is exactly what's needed to bypass geo-restrictions like those in place   
   in Iran right now.   
      
   As experts explain, DCHSpy is an intrusive piece of software that can collect   
   users' sensitive information like WhatsApp data, contacts, SMS, files,   
   location, and call logs, while even recording audio and taking photos.    
      
   First detected in July 2024, DCHSpy is maintained by MuddyWater hackers, a   
   group thought to have links with Iran's Ministry of Intelligence and    
   Security.    
      
   Experts have now discovered four new samples of DCHSpy.    
      
   "These new samples show that MuddyWater has continued to develop the   
   surveillanceware with new capabilities  this time exhibiting the ability to   
   identify and exfiltrate data from files of interest on the device as well as   
   WhatsApp data," explains Lookout.    
      
   Specifically, hackers appear to be using two malicious VPN services, called   
   EarthVPN and ComodoVPN, as a way to spread the malware .    
      
   HideVPN was another fake VPN app previously used to deploy DCHSpy.   
      
   According to Iranian Information Security Analyst, Azam Jangrevi, the latest   
   findings are a stark reminder of how sophisticated and targeted mobile   
   surveillance has become.    
      
   "Whats especially concerning is its use of trusted platforms like Telegram to   
   distribute malicious APKs, often under the guise of tools meant to protect   
   privacy," Jangrevi told TechRadar.    
      
   The risk for Iranians is especially high, considering that, as mentioned   
   earlier, citizens have been increasingly turning to the best VPN apps as the   
   internet becomes increasingly restricted.   
      
   How to stay safe    
      
   Jangrevi recommends anyone looking to download a new VPN service, or any    
   other application for that matter, to be vigilant.    
      
   "Avoid downloading apps from unofficial sources, even if they appear to offer   
   enhanced privacy. Stick to verified app stores, scrutinize app permissions,   
   and use mobile security solutions that can detect threats like DCHSpy," said   
   Jangrevi.    
      
   If youre in a high-risk region or profession such as journalism or activism,   
   Jangrevi also suggests using hardware-based security keys and encrypted   
   messaging apps vetted by independent researchers.    
      
   She said: "This incident underscores the need for greater awareness around   
   mobile threat vectors and the importance of digital hygiene in an    
   increasingly hostile cyber landscape."   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/vpn/vpn-privacy-security/beware-iran-linked-fake-vpn   
   -apps-found-to-spy-on-android-users   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca