January 24, 2020

Mobile APT Attack on Amazon CEO

Entry Type
Security Guidance
Threat Type
Phishing
Platform(s) Affected
Security Guidance
Phishing

Lookout Coverage and Recommendation for Admins

Lookout implemented detection over the air for the initial set of apps known be using the Mintegral SDK shortly after discovery. Any occurrences of apps with the Mintegral SDK will appear in the Apps section of the admin console classified as Riskware. As more apps are discovered to have this SDK, Lookout will continuously implement additional coverage.

Lookout continues to monitor Mintegral SDK releases and will update and adjust coverage when the malicious capabilities are removed. This will ensure that benign versions of previously flagged apps are not classified as Riskware.

Overview

Recently, news broke of Amazon’s CEO’s phone being hacked via a video sent on WhatsApp. The responsible account is linked to the Saudi Crown Prince and sent the seemingly harmless file, which ended up being malicious. FTI Consulting conducted a forensic investigation of the device after the rate of data leaving the CEO’s phone increased exponentially after he clicked the video file.

While FTI didn’t confirm many specifics of the investigation, this greatly resembles advanced mobile malware similar to Pegasus.

Lookout Analysis

Lookout worked together with Citizen Lab to first discover and analyze Pegasus back in 2016. Since then, Lookout has provided threat-behavior-based detections to protect against similar mobile Advanced Persistent Threats (APTs) similar to Pegasus such as eSurvAgent, Monokle, and ViperRAT.

Lookout Mobile Endpoint Security (MES) and Phishing & Content Protection (PCP) can both protect a device in this scenario in unique ways. MES will detect and protect a compromised device and malware associated with threats like APTs. PCP will monitor the web traffic to and from the device to ensure it’s not communicating with and Command and Control (C2) servers or other known malicious websites

Lookout Coverage and Recommendation for Admins

Lookout implemented detection over the air for the initial set of apps known be using the Mintegral SDK shortly after discovery. Any occurrences of apps with the Mintegral SDK will appear in the Apps section of the admin console classified as Riskware. As more apps are discovered to have this SDK, Lookout will continuously implement additional coverage.

Lookout continues to monitor Mintegral SDK releases and will update and adjust coverage when the malicious capabilities are removed. This will ensure that benign versions of previously flagged apps are not classified as Riskware.

Colleagues standing in an open meeting area and sharing a humorous moment

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

Other Related Threats

New

September 15, 2023

Scattered Spider

Scattered Spider, aka UNC3944, was able to successfully target and gain access to the infrastructure of Caesars Entertainment in its latest campaign

September 19, 2023

CVE-2023-4863

September 18, 2023

ASPL 2023-09-01 / CVE-2023-35674