Skygofree

  • First known sample

    2014
  • Discovery

    2017
  • Number of targets

    1-100
  • Current status

    Active
  • Type

    Cyberespionage toolkit
  • Targeted platforms

    Android , Windows
  • TOP targeted countries

    Italy
  • The way of propagation

    Exploits
  • Purpose/Functions

    Cyberespionage
  • Special features
    Skygofree includes functionality never seen in the wild before, such as location-based audio recording through infected devices. The spyware is spread through web pages mimicking leading mobile network operators.
  • Artefacts/Attribution
    Given the many artifacts we discovered in the malware code, as well as infrastructure analysis, we are pretty confident that the developer of the Skygofree implants is an Italian IT company that works on surveillance solutions, just like HackingTeam. Please find more information here. Please find IOC here.
  • Description

    A type of Android spyware first discovered in 2017 primarily targeting victims in Italy. Spread through fake landing pages that mimic those of mobile operators, this malware possesses the ability to record audio surroundings, steal WhatsApp messages via Accessibility Services, and connect an infected device to Wi-Fi networks controlled by cybercriminals.

    Additional information