What is FastSpy Android Malware?

FastSpy is a newly discovered malicious package targeting Android devices. The malware belongs to a trio of malicious packages attributed to the North Korean threat actor known by the alias Kimsuku group.

The trio of Android malware packages is made up of FastSpy, FastFire and FastViewer. FastViewer is distributed under the guise of a file-viewing application that has had malicious code injected into it. FastFire, on the other hand, is masquerading as a Google security plugin.

The FastSpy malware is dropped by the FastViewer malicious package. FastViewer is disguised as the legitimate Hancom Office Viewer app, but the package has been modified to include malicious code.

Once FastViewer is installed on an Android device and is used to open a specific file doctored by the threat actors, the FastSpy package is downloaded. FastSpy is used for remote control functionality. The malware abuses the Android accessibility API - behavior typical for many strains of Android malware.

The malicious package can exfiltrate messages and files from the compromised Android device.

Kimsuky APT Group Releases Malware Threats Like FastSpy That Remote Control Other Devices

November 3, 2022
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.