{"id":19732,"date":"2020-03-27T20:10:54","date_gmt":"2020-03-27T14:40:54","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/lightspy-watering-hole-attack\/19732\/"},"modified":"2020-03-27T20:10:54","modified_gmt":"2020-03-27T14:40:54","slug":"lightspy-watering-hole-attack","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/lightspy-watering-hole-attack\/19732\/","title":{"rendered":"LightSpy spyware targets iPhone users in Hong Kong"},"content":{"rendered":"<p>In January of this year, experts <a href=\"https:\/\/securelist.com\/ios-exploit-chain-deploys-lightspy-malware\/96407\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">detected<\/a> a large-scale <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/watering-hole\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">watering-hole attack<\/a> aimed at residents of Hong Kong, in which the multifunctional malware LightSpy for iOS was installed on victims\u2019 smartphones. This is yet another reminder to anyone who thinks that Apple devices, in particular iPhones, are immune to malware; they are protected, of course, but by no means totally.<\/p>\n<h2>How LightSpy infects iOS devices<\/h2>\n<p>The malware landed on victims\u2019 smartphones when they visited one of several websites disguised as local news resources \u2014 the attackers simply copied the code of real news outlets and created their own clones.<\/p>\n<p>The sites loaded a whole bunch of <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/exploit\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">exploits<\/a> onto victims\u2019 smartphones, resulting in the installation of LightSpy. Links to the fake sites were distributed through forums popular with Hong Kongers. All it took for the iPhone to get infected was one visit to a malicious page. There was no need even to tap anything.<\/p>\n<h2>What is LightSpy?<\/h2>\n<p>LightSpy malware is a modular <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/backdoor\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">backdoor<\/a> that lets an attacker remotely execute commands on the infected device and generally run amok on the victim\u2019s phone.<\/p>\n<p>For example, the attacker can determine the smartphone\u2019s location, get its contact list and call history, see which Wi-Fi networks the victim has connected to, scan the local network, and upload data about all detected IP addresses to its command-and-control (C&amp;C) server. In addition, the backdoor has modules for stealing information from Keychain (iOS\u2019s password and encryption key storage), as well as data from the WeChat, QQ, and Telegram messaging apps.<\/p>\n<p>What\u2019s interesting is that the attackers used no zero-day vulnerabilities, but so-called first-day vulnerabilities \u2014 that is, newly discovered holes for which patches have been released but included only in the latest system updates. Therefore, those iOS users who updated their devices in a timely manner could not get infected \u2014 but, of course, lots of people didn\u2019t install the updates. The attack threatened owners of smartphones running iOS 12.1 and 12.2 (the problem affects models from iPhone 6s to iPhone X).<\/p>\n<h2>How to guard against LightSpy<\/h2>\n<p>It\u2019s still unclear whether LightSpy will spread beyond China, but such toolkits have a habit of reaching a wider audience, so don\u2019t assume that the problem will pass you by. Take the following precautions for greater security:<\/p>\n<ul>\n<li>Install the latest version of the operating system. If you are reluctant to do so because of issues with iOS 13, never fear: In the current version (13.4), Wi-Fi bugs and other irritants have been fixed.<\/li>\n<li>Be very careful when following links, especially links sent by strangers. Even if they appear at first glance to point to a known website, checking the address carefully does no harm.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>During a cyberattack in Hong Kong, LightSpy spyware infected the iPhones of people visiting counterfeit news sites.<\/p>\n","protected":false},"author":2506,"featured_media":19733,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2196],"tags":[14,1133,1219,26,689,527,2841],"class_list":{"0":"post-19732","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-apple","9":"tag-exploits","10":"tag-ios","11":"tag-iphone","12":"tag-spyware","13":"tag-threats","14":"tag-watering-hole"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/lightspy-watering-hole-attack\/19732\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/lightspy-watering-hole-attack\/16255\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/lightspy-watering-hole-attack\/21301\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/lightspy-watering-hole-attack\/19557\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/lightspy-watering-hole-attack\/18292\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/lightspy-watering-hole-attack\/22261\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/lightspy-watering-hole-attack\/21190\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/lightspy-watering-hole-attack\/27832\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/lightspy-watering-hole-attack\/34501\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/lightspy-watering-hole-attack\/14561\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/lightspy-watering-hole-attack\/14635\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/lightspy-watering-hole-attack\/13239\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/lightspy-watering-hole-attack\/23518\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/lightspy-watering-hole-attack\/11282\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/lightspy-watering-hole-attack\/27972\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/lightspy-watering-hole-attack\/25221\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/lightspy-watering-hole-attack\/21952\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/lightspy-watering-hole-attack\/27169\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/lightspy-watering-hole-attack\/27008\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/19732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2506"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=19732"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/19732\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/19733"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=19732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=19732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=19732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}