RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report. Credit: Daviles / Getty Images Google’s Threat Analysis Group (TAG) has identified Italian vendor RCS Lab as a spyware offender, developing tools that are being used to exploit zero-day vulnerabilities to effect attacks on iOS and Android mobile users in Italy and Kazakhstan. According to a Google blog post on Thursday, RCS Lab uses a combination of tactics, including atypical drive-by downloads, as initial infection vectors. The company has developed tools to spy on the private data of the targeted devices, the post said. Milan-based RCS Lab claims to have affiliates in France and Spain, and on its website lists European government agencies as clients. It claims to deliver “cutting-edge technical solutions” in the field of lawful interception. The company was unavailable for comment and did not respond to email queries. In a statement to Reuters, RCS Lab said, “RCS Lab personnel are not exposed, nor participate in any activities conducted by the relevant customers.” On its website, the firm advertises that it offers “complete lawful interception services, with more than 10,000 intercepted targets handled daily in Europe alone.” Google’s TAG, on its part, said it has observed spyware campaigns using capabilities it attributes to RCS Lab. The campaigns originate with a unique link sent to the target, which, when clicked, attempts to get the user to download and install a malicious application on either Android or iOS devices. This appears to be done, in some cases, by working with the target device’s ISP to disable mobile data connectivity, Google said. Subsequently, the user receives an application download link via SMS, ostensibly for recovering data connectivity. For this reason, most of the applications masquerade as mobile carrier applications. When ISP involvement is not possible, applications masquerade as messaging apps. Authorized drive-by downloads Defined as downloads that users authorize without understanding the consequences, the “authorized drive by” technique has been a recurrent method used to infect both iOS and Android devices, Google said. The RCS iOS drive-by follows Apple instructions for distributing proprietary in-house apps to Apple devices, Google said. It uses ITMS (IT management suite) protocols and signs payload-bearing applications with a certificate from 3-1 Mobile, an Italy-based company enrolled in the Apple Developer Enterprise program. The iOS payload is broken into multiple parts, leveraging four publicly known exploits—LightSpeed, SockPuppet, TimeWaste, Avecesare—and two recently identified exploits, internally known as Clicked2 and Clicked 3. The Android drive-by relies on users enabling installation of an application that disguises itself as a legitimate app that displays an official Samsung icon. To protect its users, Google has implemented changes in Google Play Protect and disabled Firebase projects used as C2—the command and control techniques used for communications with affected devices. Additionally, Google has listed a few indicators of compromise (IOC) in its blog post, to help security professionals detect intrusions. Related content news analysis Google can’t seem to quit cookies, delays killing them again Google cited regulatory challenges in its oft-delayed plans to phase out third-party cookies from its Chromium products. It now plans to eliminate cookies in 2025 By Lucas Mearian Apr 25, 2024 5 mins Chrome Browser Security Chrome OS news Apple reportedly cuts Vision Pro production due to low demand Apple analyst Ming-Chi Kuo claims Apple is putting the brakes on production of the spatial computing headset due to low demand; the Vision Pro launched in the US earlier this year. By Matthew Finnegan Apr 25, 2024 4 mins Augmented Reality Apple Virtual Reality feature Windows 11: A guide to the updates Here’s what you need to know about the latest updates to Windows 11 as they’re released from Microsoft. Now updated for KB506980 Preview, released on April 23, 2024. By Preston Gralla Apr 25, 2024 59 mins Small and Medium Business Windows 11 Windows feature Windows 10: A guide to the updates Here's what you need to know about each update to the current version of Windows 10 as it's released from Microsoft. Now updated for KB5036979 Preview, released on April 23, 2024. By Preston Gralla Apr 25, 2024 172 mins Small and Medium Business Windows 10 Microsoft Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe