The advisory discusses a new strain of spyware that appears to target messaging apps.
On November 24th, CISA released a new guidance on spyware threats, Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications.
The notice details how some malicious actors are using targeted social engineering techniques to gain access to victims’ messaging apps, which can then help the actors facilitate the deployment of “additional malicious payloads that can further compromise the victim’s mobile device.”
The advisory discusses some specific tactics cyber threat actors are using, which include:
CISA found that threat actors are opportunistic, something that is generally true for any cybercrime; but in this case, the malicious individuals are also targeting what’s considered “high-value individuals,” which can include the military, government, and other political officials. Threat actors may also target civil society organizations (CSOs) and individuals in the United States, Europe, and the Middle East.
CISA provided several suggestions for messaging app users. They have several guides, including the Mobile Communications Best Practice Guidance, which includes suggestions to:
Their other guide, Mitigating Cyber Threats with Limited Resources, highlights strategies like:
While many businesses and healthcare practices use other platforms, like email, to communicate, some organizations also use messaging–whether for internal communications, or to send scheduling reminders or other quick messages. When it comes to handling PHI, messages on any platform must be secure and encrypted, or it could risk leading to a data breach. Organizations should stay aware of what tools are potentially vulnerable to data breaches.
In particular, security teams should be mindful of potential zero-click exploits and monitor their network for potentially detrimental messages. Zero-click exploits highlight the need for robust cybersecurity, as it eliminates the human element. Regardless, Ryan Winchester, Director of IT at CareM, emphasizes that human failure can be a major tool for exploitation, stating, “No amount of training can completely eliminate human error, so businesses must have safeguards in place.”
According to the alert, certain apps like Signal and WhatsApp are being exploited, as well as Android messaging and Apple messaging.
No, these attacks are more likely to target military or government officials. However, CISA noted they may attack civil services that are found to be of high value, which may include healthcare.