Google blocks 'Lipizzan' Android spyware
A new batch of spyware named 'Lipizzan' that could capture users' text messages, voice calls, location data and photos has been discovered and blocked by Google.
The company, in a blog post, said it discovered a new family of Android spyware while investigating another spyware named 'Chrysaor'.
"In the course of our Chrysaor investigation, we used similar techniques to discover a new and unrelated family of spyware called Lipizzan. Lipizzan's code contains references to a cyber arms company, Equus Technologies," read the blog post.
It is a multi-stage spyware product capable of monitoring and exfiltrating a user's email, SMS messages, location, voice calls and media.
"We have found 20 Lipizzan apps distributed in a targeted fashion to fewer than 100 devices in total and have blocked the developers and apps from the Android ecosystem. Google Play Protect has notified all affected devices and removed the Lipizzan apps," the post read.
'Lipizzan' spyware was capable of performing tasks that include taking screensots, taking pictures with the device camera, recording from the device's microphone, call recording and location monitoring.
Lipizzan was a sophisticated two-stage spyware tool.
The first stage found by Google Play Protect was distributed through several channels, including Google Play, and typically impersonated an innocuous-sounding app such as a "Backup" or "Cleaner" app.
Upon installation, 'Lipizzan' would download and load a second "license verification" stage, which would survey the infected device and validate certain abort criteria.
If given the all-clear, the second stage would then root the device with known exploits and begin to exfiltrate device data to a command and control server, the post said.
According to the post, there were fewer than 100 devices that checked into Google Play Protect with the apps. That means the family affected only 0.000007 percent of Android devices. "Since we identified Lipizzan, Google Play Protect removed Lipizzan from affected devices and actively blocks installs on new devices," the blog post said.