Cybersecurity

Is Hermit the new Pegasus?

While the Pegasus spyware is still lurking in the shadows, a new spyware has come crawling out of the woodwork. Dubbed Hermit, the spyware moves via SMS and impersonates applications from telecommunications companies or smartphone manufacturers. It can exploit a rooted device, record audio and make and redirect phone calls and collect data including call logs, contacts, photos, device location and SMS messages

The modular spyware is named after a distinct server path used by the attacker’s command and control (C2).

How did it all begin

The researchers from US-based Lookout Threat Lab, an integrated endpoint-to-cloud security company, first spotted the Hermit within Kazakhstan’s borders. The lab claims to have evidence that it was used by the government of Kazakhstan. “While we’ve been following this threat for a while using Lookout Endpoint Detection and Response (EDR) these latest samples were detected in April 2022, four months after nationwide protests against government policies were violently suppressed. Our analysis suggests that Hermit has not only been deployed to Kazakhstan but that an entity of the national government is likely behind the campaign,” said the Lookout team.

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Sécurité des mots de passe : bonnes pratiques pour éviter les failles

Sécurité des mots de passe : bonnes pratiques pour éviter les failles La sécurité des…

2 jours ago

Ransomware : comment prévenir et réagir face à une attaque

Ransomware : comment prévenir et réagir face à une attaque Le ransomware est l’une des…

3 jours ago

Cybersécurité et e-commerce : protéger vos clients et vos ventes

Cybersécurité et e-commerce : protéger vos clients et vos ventes En 2025, les sites e-commerce…

6 jours ago

Les ransomwares : comprendre et se défendre contre cette menace

Les ransomwares : comprendre et se défendre contre cette menace En 2025, les ransomwares représentent…

1 semaine ago

RGPD et cybersécurité : comment rester conforme en 2025

RGPD et cybersécurité : comment rester conforme en 2025 Depuis sa mise en application en…

1 semaine ago

VPN : un outil indispensable pour protéger vos données

VPN : un outil indispensable pour protéger vos données Le VPN, ou « Virtual Private…

1 semaine ago

This website uses cookies.