RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report. Credit: Daviles / Getty Images Google’s Threat Analysis Group (TAG) has identified Italian vendor RCS Lab as a spyware offender, developing tools that are being used to exploit zero-day vulnerabilities to effect attacks on iOS and Android mobile users in Italy and Kazakhstan. According to a Google blog post on Thursday, RCS Lab uses a combination of tactics, including atypical drive-by downloads, as initial infection vectors. The company has developed tools to spy on the private data of the targeted devices, the post said. Milan-based RCS Lab claims to have affiliates in France and Spain, and on its website lists European government agencies as clients. It claims to deliver “cutting-edge technical solutions” in the field of lawful interception. The company was unavailable for comment and did not respond to email queries. In a statement to Reuters, RCS Lab said, “RCS Lab personnel are not exposed, nor participate in any activities conducted by the relevant customers.” On its website, the firm advertises that it offers “complete lawful interception services, with more than 10,000 intercepted targets handled daily in Europe alone.” Google’s TAG, on its part, said it has observed spyware campaigns using capabilities it attributes to RCS Lab. The campaigns originate with a unique link sent to the target, which, when clicked, attempts to get the user to download and install a malicious application on either Android or iOS devices. This appears to be done, in some cases, by working with the target device’s ISP to disable mobile data connectivity, Google said. Subsequently, the user receives an application download link via SMS, ostensibly for recovering data connectivity. For this reason, most of the applications masquerade as mobile carrier applications. When ISP involvement is not possible, applications masquerade as messaging apps. Authorized drive-by downloads Defined as downloads that users authorize without understanding the consequences, the “authorized drive by” technique has been a recurrent method used to infect both iOS and Android devices, Google said. The RCS iOS drive-by follows Apple instructions for distributing proprietary in-house apps to Apple devices, Google said. It uses ITMS (IT management suite) protocols and signs payload-bearing applications with a certificate from 3-1 Mobile, an Italy-based company enrolled in the Apple Developer Enterprise program. The iOS payload is broken into multiple parts, leveraging four publicly known exploits—LightSpeed, SockPuppet, TimeWaste, Avecesare—and two recently identified exploits, internally known as Clicked2 and Clicked 3. The Android drive-by relies on users enabling installation of an application that disguises itself as a legitimate app that displays an official Samsung icon. To protect its users, Google has implemented changes in Google Play Protect and disabled Firebase projects used as C2—the command and control techniques used for communications with affected devices. Additionally, Google has listed a few indicators of compromise (IOC) in its blog post, to help security professionals detect intrusions. Related content feature 8 AI-powered apps that'll actually save you time Most AI apps are buzzword-chasing hype-mongers. These eight off-the-beaten-path supertools are rare exceptions. By JR Raphael Jul 01, 2024 15 mins Generative AI Productivity Software news analysis EU commissioner slams Apple Intelligence delay Margrethe Vestager, Europe's chief gatekeeper, takes a shot at Apple's decision to delay rolling out the company's AI. By Jonny Evans Jun 28, 2024 7 mins Regulation Apple Generative AI how-to Download our unified communications as a service (UCaaS) enterprise buyer’s guide Does your phone system date back to the last century? If so, you’re missing out on new technologies that can increase productivity and support a more distributed workforce. That’s where unified communications as a service, or UCaaS, comes By Andy Patrizio Jun 28, 2024 1 min Unified Communications Enterprise Buyer’s Guides Cloud Computing feature Enterprise buyer’s guide: Android smartphones for business Security is the biggest — but not only — factor when deciding what Android devices to support in your enterprise. See how Google, Honor, Huawei, Infinix, Itel, Motorola, Nokia, OnePlus, Oppo, Realme, Samsung, Tecno, Vivo, and Xiaomi stack By Galen Gruman Jun 28, 2024 23 mins Google Samsung Electronics Smartphones Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe