{"id":92150,"date":"2025-12-13T07:00:00","date_gmt":"2025-12-13T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=92150"},"modified":"2025-12-15T12:35:46","modified_gmt":"2025-12-15T09:35:46","slug":"new-android-spyware-an-asus-leak-and-other-cybersecurity-developments","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/new-android-spyware-an-asus-leak-and-other-cybersecurity-developments\/","title":{"rendered":"New Android Malware, ASUS Breach, and More: This Week in Cybersecurity"},"content":{"rendered":"<p>The week\u2019s key cybersecurity developments.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Researchers found a compromised device belonging to a North Korean hacker.<\/li>\n<li>Spyware is targeting Android users.<\/li>\n<li>The Broadside botnet targets maritime navigation systems.<\/li>\n<li>Asus, Qualcomm and ArcSoft were hit by hackers.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">Analysts find a North Korean hacker\u2019s compromised device<\/h2>\n<p>Researchers at Israeli cybersecurity firm Hudson Rock <a href=\"https:\/\/www.hudsonrock.com\/blog\/5692\">found<\/a> in the logs of the Lumma infostealer a compromised device belonging to a North Korean hacker.<\/p>\n<p>The data point to a direct link between the owner and infrastructure used in the <a href=\"https:\/\/forklog.com\/en\/news\/life-after-bybit\">attack on Bybit<\/a> in February. A crucial clue was an email address on the device that had appeared in <a href=\"https:\/\/www.silentpush.com\/blog\/lazarus-bybit\/\">Silent Push<\/a> reports; it was used to register a phishing domain just hours before the Bybit incident.<\/p>\n<p>Although the owner of the infected system may not have taken part directly in the theft of funds, experts are confident the machine was part of the shared resource pool of <a href=\"https:\/\/forklog.com\/en\/news\/lazarus-group-what-we-know-about-the-outfit-suspected-of-the-bybit-hack\">Lazarus<\/a>.<\/p>\n<p>According to the analysts, the compromised workstation was powerful and purpose-built for developing hacking tools. Despite using a VPN to appear as a US IP address, the browser language was set to Chinese, and the search history contained requests to translate from Korean.<\/p>\n<p>Disk activity suggested the hacker was preparing a new phishing campaign. The researchers also found evidence of purchases of domains impersonating popular services and local files for fake Zoom installers.<\/p>\n<h2 class=\"wp-block-heading\">Spyware targets Android users<\/h2>\n<p>Zimperium experts <a href=\"https:\/\/zimperium.com\/blog\/total-takeover-droidlock-hijacks-your-device\">identified<\/a> a new malicious campaign targeting Android users.<\/p>\n<p>The newly observed DroidLock trojan blends ransomware and spyware functions. It spreads via fraudulent sites masquerading as legitimate apps, using a two-stage infection scheme. Once installed, it tricks users into granting device administrator and accessibility permissions.<\/p>\n<p>The trojan mainly targets Spanish-speaking users and can change the PIN and biometric settings, as well as remotely control the device. It also captures unlock patterns, records audio and steals the contents of SMS and calls.<\/p>\n<p>Unlike traditional lockers, DroidLock does not encrypt files; it threatens to delete them. On command from its server, a ransom demand is displayed on the screen.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-0b22bb413dfe29f5-782770963814234.webp\" alt=\"image\" class=\"wp-image-271680\"\/><figcaption class=\"wp-element-caption\">Source: Zimperium.<\/figcaption><\/figure>\n<p>The researchers have notified the Android security team, and Google Play Protect can now detect and block the threat.<\/p>\n<p>They strongly advise against sideloading APK files from third-party sources and urge caution with apps that request device administrator rights.<\/p>\n<h2 class=\"wp-block-heading\">The Broadside botnet targets ships\u2019 navigation systems<\/h2>\n<p>The new Broadside botnet is actively infecting CCTV systems and <span data-descr=\"Internet of Things\" class=\"old_tooltip\">IoT<\/span> gateways on commercial vessels, <a href=\"https:\/\/cydome.io\/broadside-a-new-variant-of-the-mirai-botnet-targeting-maritime\/\">report<\/a> experts at Cydome, a maritime-cybersecurity firm.<\/p>\n<p>The malware is based on Mirai\u2019s code. Its chief danger lies in its ability to mount powerful <span data-descr=\"distributed denial of service\" class=\"old_tooltip\">DDoS<\/span> attacks and covertly intercept video streams. Infected devices can be used as a beachhead to penetrate ships\u2019 navigation systems, posing a direct threat to maritime safety.<\/p>\n<p>According to Cydome, the botnet activates password\u2011brute\u2011forcing against VSAT satellite terminals that provide connectivity to ships on the open sea. Infection happens automatically when a victim enters the coverage area. After compromising the gateway, the malware scans the vessel\u2019s local network for weaknesses in electronic navigation chart display systems.<\/p>\n<p>The researchers warned that Broadside\u2019s operators have begun selling access to infected onboard networks on underground forums. Buyers may include rivals of logistics firms seeking route and cargo data, as well as pirates using vessel location information to plan physical attacks in high\u2011risk regions.<\/p>\n<h2 class=\"wp-block-heading\">Asus, Qualcomm and ArcSoft hit by hackers<\/h2>\n<p>Asus <a href=\"https:\/\/press.asus.com\/news\/statements\/public-statement-unauthorized-third-party-data-access\/\">confirmed<\/a> unauthorised access at a supplier\u2019s infrastructure. The extortion group Everest in turn claimed a large data theft, the outlet <a href=\"https:\/\/xakep.ru\/2025\/12\/09\/asus-leak\/\">Hacker<\/a> reported.<\/p>\n<p>The criminals say they stole 1TB of confidential information from all three companies \u2014 Asus, Qualcomm and ArcSoft. Media reports say the haul includes smartphone\u2011camera software source code, custom AI models and internal developer tools.<\/p>\n<p>As proof, the hackers posted screenshots of compromised files on the dark web.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-b18ad493d0f44c78-782771178948480.webp\" alt=\"image\" class=\"wp-image-271681\"\/><figcaption class=\"wp-element-caption\">Source: \u201cHacker\u201d.<\/figcaption><\/figure>\n<p>Asus stressed that the attack did not affect its own servers or customer data. The leak was limited to parts of the mobile\u2011camera software source code managed by a partner. The company has launched a supply\u2011chain security audit but did not name the compromised contractor.<\/p>\n<p>At the time of writing, Qualcomm and ArcSoft had not commented on the possible data loss.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>Belarus\u2019s Ministry of Information <a href=\"https:\/\/forklog.com\/en\/news\/belarus-cites-inappropriate-advertising-for-crypto-exchange-blockade\">cited<\/a> the reason for blocking several crypto exchanges.<\/li>\n<li>A co\u2011founder of the Finiko pyramid <a href=\"https:\/\/forklog.com\/en\/news\/co-founder-of-finiko-pyramid-extradited-from-uae-to-russia\">was extradited<\/a> from the UAE to Russia.<\/li>\n<li>Silk Road wallets <a href=\"https:\/\/forklog.com\/en\/news\/silk-road-wallets-transfer-3-million-in-bitcoin\">moved<\/a> $3m in bitcoin.<\/li>\n<li>Arkham <a href=\"https:\/\/forklog.com\/en\/news\/arkham-unveils-over-half-of-zcash-transactions\">de\u2011anonymised<\/a> more than half of Zcash transactions.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>French thinkers showed that technology is not neutral. The internet, conceived as a realm of freedom, carries the genes of control and simulation.<\/p>\n<p>How 20th\u2011century ideas help explain the current state of <a href=\"https:\/\/forklog.com\/en\/news\/what-is-web3\">Web3<\/a> \u2014 read our new ForkLog piece.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week\u2019s key cybersecurity developments.<\/p>\n","protected":false},"author":1,"featured_media":92151,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"New Android spyware, a supplier breach tied to Asus, and a botnet menacing maritime systems.","creation_source":"ai_translated","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-92150","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"176","promo_type":"1","layout_type":"1","short_excerpt":"New Android spyware, a supplier breach tied to Asus, and a botnet menacing maritime systems.","is_update":"0","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/92150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=92150"}],"version-history":[{"count":2,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/92150\/revisions"}],"predecessor-version":[{"id":92197,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/92150\/revisions\/92197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/92151"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=92150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=92150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=92150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}