Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
North Korean Hackers Exploit Google’s Find My Device to Wipe Android Phones
Advertisements

A North Korean state-sponsored hacking group, known as Kimsuky or APT43, has been observed using custom Android malware to weaponize Google’s Find My Device service. According to research from cybersecurity firm Mandiant, the group uses the service not for recovery, but as a destructive tool to remotely wipe compromised devices after exfiltrating data.

The threat actors deploy a sophisticated Android malware named Plankwalk. This malware provides the attackers with extensive control over an infected device, enabling them to steal sensitive information and manage files remotely.

Plankwalk Malware’s Espionage Capabilities

Once installed on a target’s device, the Plankwalk malware grants its operators significant spying abilities. The malware is designed to exfiltrate a wide range of data, including contact lists, SMS messages, call logs, and specific device information such as its IMEI and phone number. It can also retrieve the device’s current location data. Beyond data theft, Plankwalk allows the Kimsuky operators to enumerate, download, and delete files stored on the Android device. The malware also includes functions to record audio and capture screenshots, adding to its surveillance toolkit. Communications with its command-and-control (C2) server are secured using AES encryption to evade detection.

Weaponizing Find My Device for Destruction

A key function of the Plankwalk malware is its ability to interact with Google’s Find My Device feature. After gaining access to the device, the malware steals the victim’s Google account credentials. These stolen credentials are then used by the attackers to programmatically access the Find My Device service associated with the account. By manipulating the service, the Kimsuky group can trigger the ‘erase device’ function, initiating a full factory reset. Mandiant researchers report that this destructive capability is used by the threat actor to destroy forensic evidence on the device after successfully stealing the desired information, effectively covering their tracks.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading