Read more:Iranian APT MuddyWater has been using new versions of the DCHSpy Android surveillance tool since the beginning of the conflict with Israel.
Iran-linked APT MuddyWater has been deploying a new version of the DCHSpy Android spyware in the context of the Israel-Iran conflict, mobile security firm Lookout reports.
Active since at least 2017 and also tracked as Mango Sandstorm, Mercury, Seedworm, and Static Kitten, the hacking group is known for conducting espionage operations focused on the Middle East, and was linked by the US to the Iranian Ministry of Intelligence and Security (MOIS).
One week after the Israel-Iran conflict started, Lookout identified new DCHSpy samples, which appear to have been deployed against adversaries disguised as VPNs or banking applications, using political lures.
Iranian APT Targets Android Users With New Variants of DCHSpy Spyware
Iranian APT MuddyWater has been using new versions of the DCHSpy Android surveillance tool since the beginning of the conflict with Israel.