Jul 24, 2019 - Technology

Russian contractor tied to 2016 election interference unleashes mobile phone spyware

A Russian military contractor tied to 2016 U.S. election interference is behind a spate of mobile phone surveillance programs, researchers at Lookout mobile security have determined.

Driving the news: The mobile spyware, dubbed Monokle, was disguised as several different Android apps — ranging from pornography to Google. Monokle may have been in use since 2015.

The targets: Some of the fake apps were intended for highly specialized audiences, which may give a sense of some of the intended targets.

  • A fake version of “UzbekChat” appears to be intended for people in or communicating with Uzbekistan.
  • A fake program called "Ahrar Maps" appears to be targeted at the Ahrar al-Sham militant group in Syria.
  • A fake app titled "Caucas" appears to target the Caucasus region.

The attacker: Lookout says Monokle uses the same private internet infrastructure as an antivirus product developed by Special Technology Centre, Ltd. (STC), a Russian military contractor sanctioned by the Obama administration for its role in 2016 election tampering.

  • Two developers' names and the name "Monokle" are referenced in the code for Monokle.
  • There is evidence that an iOS version is being developed.

Unique features: Monokle is able to change security certificates on cellphones, giving STC the ability to alter data being sent to and from the phone.

Go deeper