‘EagleMsgSpy’ Android Spyware Linked to Chinese Police

‘EagleMsgSpy’ Android Spyware Linked to Chinese Police

Think twice about handing over your phone to Chinese police. Law enforcement in the country appears to be installing mobile spyware on confiscated devices.

Cybersecurity vendor Lookout discovered a new spyware strain, dubbed EagleMsgSpy, that targets Android phones and has avoided scrutiny until now. The malicious program stands out because it’ll connect to IP addresses for public security bureaus in China, an indication that EagleMsgSpy operates as a state surveillance tool. 

In a report, Lookout said it obtained “several variants” of the spyware, which has been in operation since at least 2017. The company’s examination of the spyware samples shows that EagleMsgSpy can collect call logs, SMS chats, and messages from WhatsApp, WeChat, and Telegram, in addition to capturing screenshots and audio recordings from the device.  

(Credit: Lookout)

“Lookout researchers have observed an evolution in the sophistication of the use of obfuscation and storage of encrypted keys over time,” the report added. “This indicates that this surveillanceware is an actively maintained product whose creators make continuous efforts to protect it from discovery and analysis.”

The data EagleMsgSpy secretly collects will be password-protected and sent to a command and control server. Lookout managed to access large parts of the source code powering the servers, which revealed that EagleMsgSpy may also have been designed to target iOS devices. 

The manual for the spyware

(Credit: Lookout)

The investigation uncovered a help document for the spyware within the server, which described EagleMsgSpy as a “comprehensive mobile phone judicial monitoring product.”  An IP address for one of the spyware servers also belonged to a private Chinese company called Wuhan Chinasoft Token Information Technology Co., Ltd, the likely developer.

Recommended by Our Editors

Fortunately, EagleMsgSpy doesn’t appear to spread through some unknown Android vulnerability or via fake apps. Instead, it requires physical access to an Android phone for it to be installed. One of the uncovered help documents also notes that spyware can be installed through a QR code or via a USB cable connected to an unlocked phone. 

Lookout adds that EagleMsgSpy is likely “just one of many contracted mobile surveillance tools used by law enforcement throughout mainland China,” citing Chinese government contracts that have been posted online.

Like What You’re Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

Newsletter Pointer

About Michael Kan

Senior Reporter

Michael Kan

I’ve been working as a journalist for over 15 years—I got my start as a schools and cities reporter in Kansas City and joined PCMag in 2017.


Read Michael’s full bio

Read the latest from Michael Kan

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *