Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Lookout Research: Nation-State Mobile Malware Targets Syrians with COVID-19 Lures

SEC0320-cyber-feat-slide1_900px.jpg
April 16, 2020

Lookout researchers have uncovered a long-running surveillance campaign tied to Syrian nation-state actors, which recently started using the novel coronavirus as its newest lure to entice its targets to download malware. This campaign appears to have been active since the start of January 2018, and targets Arabic-speaking users, likely in Syria and the surrounding region.

None of these apps were available on the official Google Play Store, suggesting they were likely distributed through actor-operated watering holes or third-party app stores. Lookout previously reported on another surveillanceware campaign using COVID-19 related lures targeting Libya.

Below are some of the findings from Lookout's blog. 

Syrian Connections

Lookout researchers found 71 malicious Android applications connected to the same command-and-control (C2) server. The researchers note that the IP address of the C2 server is located in a block of addresses held by Tarassul Internet Service Provider, an ISP owned by - and sharing network infrastructure with - the Syrian Telecommunications Establishment (STE).  STE, claim the researchers, has a history of hosting infrastructure for the Syrian Electronic Army (SEA), a Syrian state-sponsored hacking group. Notably, the C2 servers of SilverHawk, an Android malware family previously reported on by Lookout researchers, were located on IP addresses belonging to STE.

Not all applications in this campaign were completely scrubbed of sensitive information when they were created, but a large portion of the malicious applications are SpyNote samples, which store C2 information, along with user inputted names, version numbers, and other information, in res/values/strings.xml, say the researchers. In the strings.xml files of these applications, 22 APKs reference “Allosh”, a name previously used in connection with a known Syrian Electronic Army persona  -  a group which has been active recently, with one of their Twitter accounts claiming responsibility this month for DDoS attacks against Belgian media, as well as defacing PayPal and eBay websites as recently as April 7, 2020.

Initial Discovery

Lookout researchs began the investigation with the discovery of an application (3c5fd8b163b32cde47dd50c4b61ab087c0cad8d4) called “Covid19”, an AndoServer malware sample that was signed and packaged on March 28, 2020. Upon launch, say the researchers, this application asks to install an application titled “قياس درجة” (Degree Measure), and requests permission to take pictures, video, and modify or delete contents of the SD card before removing its own launch icon.

The newly installed application (com.finger.body.temperature.ap) is a benign prank, report the researchers - a fake digital thermometer that is meant to serve as a decoy, while the malware continues to operate in the background.

According to the researchers, AndoServer samples receive commands, and are capable of:

  • Taking a screenshot
  • Getting battery levels and if the device is plugged in
  • Reporting location (latitude and longitude)
  • Getting a list of installed applications
  • Launching an application specified by the malicious actor
  • Checking the number of cameras on a device
  • Choosing a specific camera to access
  • Creating a specific pop-up message (toast)
  • Recording audio
  • Creating a file on external storage
  • Exfiltrating call logs
  • Listing files contained in a specified directory
  • Calling a phone number
  • Exfiltrating SMS messages
  • Sending SMS to a phone number
  • Exfiltrating the contact list
  • Playing a ringtone and then sleeping

AndoServer malware has its C2 domain or IP address hard coded into the source code, add the researchers: "Each sample also has its own unique identifier string at the start of its communication with C2 servers, that appears to be for the actor to monitor which application in their arsenal is responsible for the compromise, as they can see the unique application installed by the specific victim.  While not always the case, some unique identifiers are similar to the name of the C2 domain, while other times they refer to the title of the application, highlighting another level of customization of this malware."

For more information and the full blog, please visit https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures

KEYWORDS: COVID-19 cyber security malware nation-state attack surveillance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • coronavirus

    Lookout Research: Commercial Surveillanceware Operators Latest to Take Advantage of COVID-19

    See More
  • cyber-security--data-freepik

    McAfee sees surge in mobile malware targeting COVID-19 vaccines

    See More
  • malware-cyber-crime-freepik.jpg

    New malware uses COVID-19 lure to target Android users

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing