"Chinese APT41 Hackers Target Mobile Devices with New WyrmSpy and DragonEgg Spyware"
WyrmSpy and DragonEgg, two previously undocumented Android spyware strains, have been linked to APT41, a prolific nation-state actor with ties to China. According to Lookout, an established threat actor such as APT41, known for exploiting web-facing applications and infiltrating traditional endpoint devices, adding mobile malware to its arsenal, demonstrates that mobile endpoints are high-value targets with corporate and personal data. Since at least 2007, APT41, also known as Axiom, Blackfly, Brass Typhoon, Bronze Atlas, HOODOO, Wicked Panda, and Winnti, has been known to target various industries for intellectual property theft. Recent attacks launched by the group involved Google Command and Control (GC2), an open source red teaming tool, to target media and employment platforms in Taiwan and Italy. This article continues to discuss APT41 targeting mobile devices with WyrmSpy and DragonEgg spyware.
THN reports "Chinese APT41 Hackers Target Mobile Devices with New WyrmSpy and DragonEgg Spyware"