Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Iranian APT Targets Android Users With New Variants of DCHSpy Spyware

Posted on July 21, 2025July 21, 2025 By CWS

Iran-linked APT MuddyWater has been deploying a brand new model of the DCHSpy Android spy ware within the context of the Israel-Iran battle, cell safety agency Lookout experiences.

Energetic since no less than 2017 and in addition tracked as Mango Sandstorm, Mercury, Seedworm, and Static Kitten, the hacking group is understood for conducting espionage operations centered on the Center East, and was linked by the US to the Iranian Ministry of Intelligence and Safety (MOIS).

One week after the Israel-Iran battle began, Lookout recognized new DCHSpy samples, which seem to have been deployed in opposition to adversaries disguised as VPNs or banking functions, utilizing political lures.

DCHSpy, Lookout explains in a contemporary report, is probably going developed and maintained by MuddyWater for surveillance functions, and shares infrastructure with SandStrike, one other Android spy ware linked to the hacking group.

Lookout analyzed a SandStrike pattern that contained a malicious VPN configuration file connecting to the espionage group’s infrastructure. The pattern was used to deploy a MuddyWater PowerShell RAT.

“DCHSpy makes use of related ways and infrastructure as SandStrike. It’s distributed to focused teams and people by leveraging pretend URLs shared instantly over messaging apps akin to Telegram,” Lookout notes.

From the contaminated gadgets, the modular malware can harvest person accounts, contacts, SMS messages, native recordsdata, location knowledge, name logs, and WhatsApp info. It could possibly additionally take over the microphone and digital camera to report audio and take images.

The collected info is compressed, encrypted with a password acquired from the command-and-control (C&C) server, and uploaded to an SFTP server.Commercial. Scroll to proceed studying.

The DCHSpy samples recognized because the starting of the Israel-Iran battle had been distributed underneath the title of Earth VPN, Comodo VPN, Disguise VPN, and Hazrat Eshq, marketed on numerous Telegram channels to English and Farsi audio system, utilizing anti-Iran themes and language.

One of many Earth VPN samples has been distributed utilizing Starlink lures, seemingly making the most of the “current experiences of Starlink providing web companies to the Iranian inhabitants throughout the web outage imposed by the Iranian authorities following hostilities between Israel and Iran,” Lookout notes.

Up to now, the cybersecurity agency has recognized 17 cell malware households that no less than 10 Iranian APTs have been utilizing in surveillance assaults in opposition to cell phone customers.

“These most up-to-date samples of DCHSpy point out continued growth and utilization of the surveillanceware because the scenario within the Center East evolves, particularly as Iran cracks down on its residents following the ceasefire with Israel,” Lookout notes.

Associated: US Calls Reported Threats by Professional-Iran Hackers to Launch Trump-Tied Materials a ‘Smear Marketing campaign’

Associated: Iranian Hackers’ Most well-liked ICS Targets Left Open Amid Recent US Assault Warning

Associated: US Braces for Cyberattacks After Bombing Iranian Nuclear Websites

Associated: Iranian Hackers Goal UAE Companies With Polyglot Information

Security Week News Tags:Android, APT, DCHSpy, Iranian, Spyware, Targets, Users, Variants

Post navigation

Previous Post: APT41 Hackers Leveraging Atexec and WmiExec Windows Modules to Deploy Malware
Next Post: Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information

Related Posts

Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet Security Week News
EU Unveils AI Code of Practice to Help Businesses Comply With Bloc’s Rules Security Week News
Cloudflare Puts a Default Block on AI Web Scraping Security Week News
Asus DriverHub Vulnerabilities Expose Users to Remote Code Execution Attacks Security Week News
HPE Patches Critical Vulnerability in StoreOnce Security Week News
Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Recognize Deepfake Videos
  • Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet
  • New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords
  • How to Use Threat Intelligence to Enhance Cybersecurity Operations
  • Securing Virtualized Environments – Hypervisor Security Best Practices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Recognize Deepfake Videos
  • Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet
  • New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords
  • How to Use Threat Intelligence to Enhance Cybersecurity Operations
  • Securing Virtualized Environments – Hypervisor Security Best Practices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News