StrongPity is a malicious software (malware) that infiltrates computer systems, typically through suspicious downloads, emails, or websites. The malware has been active for over a decade and is possibly linked to the Turkish government. It's designed to exploit and damage systems, steal personal information, disrupt operations, and potentially hold data hostage. There was a significant increase in StrongPity's activity at the beginning of the year, particularly in January and March. This malware has affected numerous countries, with recent expansions into Algeria, Lebanon, Armenia, and Iran. Despite consistent targeting, infrastructure, and infection vectors, there has been a noticeable change in the documents the malware attempts to exfiltrate.
In 2020, a new version of the StrongPity implant, known as StrongPity4, was discovered. This variant appeared more advanced than its predecessors and was detected in a small number of victims in Egypt, Syria, and Turkey. Furthermore, new variants of loaders used to initiate the main StrongPity implants were also identified. These many different versions, coupled with hardcoded domains, suggest the use of a tool like a Builder to generate the binaries. Notably, if a victim grants the malicious StrongPity app accessibility services, one of its modules can access incoming notifications and exfiltrate communication from several apps, including Viber, Skype, Gmail, Messenger, and Tinder.
The deployment method of StrongPity has drawn comparisons to other cyberespionage campaigns, such as Turla—a campaign linked to the Russian security services. Like Turla, StrongPity has reportedly trojanized software installers at the Internet Service Provider (ISP) level. This approach suggests a high level of sophistication and resourcefulness. However, there are indications that StrongPity may not have fully thought through some aspects of its operation. For example, it appears that StrongPity hasn't obtained its own API ID based on Telegram's error documentation, which could potentially limit its effectiveness. Regardless, the malware remains a significant threat, with Turla, StrongPity, Winnti, OceanLotus, and WildNeutron identified as the most active based on malware detections.
Description last updated: 2024-03-14T09:52:58.140Z