lightSpy

Description

(Trend Micro) The iOS malware, which we named ‘lightSpy’ (detected by Trend Micro as IOS_LightSpy.A), is a modular backdoor that allowed the attacker to remotely execute a shell command and manipulate files on the infected device. It is also implemented with several functionalities through different modules for exfiltrating data from the infected device including:

• Hardware information • Contacts • Keychain • SMS messages • Phone call history • GPS location • Connected Wi-Fi history • Browser history of Safari and Chrome
The malware also reports the surrounding environment of the device by: • Scanning local network IP address • Scanning available Wi-Fi network

The campaign also employs modules specifically designed to exfiltrate data from popular messenger applications such as QQ, WeChat, and Telegram.

Names

Name
lightSpy

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Info stealer
  • Exfiltration

Information

Mitre Attack

Malpedia

Other Information

Uuid

4c9d4f77-ee82-4452-b187-84072275951e

Last Card Change

2025-06-28