New Android Spyware Tied to Iranian Intelligence Uncovered
Cybersecurity experts have recently identified new Android spyware likely associated with the Iranian Ministry of Intelligence and Security (MOIS). This spyware is reportedly being distributed under the disguise of VPN applications and Starlink, a satellite internet service from SpaceX.
Discovery of DCHSpy
According to mobile security company Lookout, four samples of a surveillance tool known as DCHSpy were discovered shortly after hostilities resumed between Israel and Iran last month. The exact number of individuals affected by these malicious applications remains unclear but raises significant concerns about user privacy and security.
What DCHSpy Can Do
DCHSpy is capable of an extensive range of data collection. It can gather information such as WhatsApp messages, account details, contact lists, SMS, files, location data, call logs, and even audio recordings and photographs. Security researchers Alemdar Islamoglu and Justin Albrecht have highlighted its alarming capabilities, emphasizing the potential threats to personal privacy.
Background on DCHSpy
Initially detected in July 2024, DCHSpy is linked to the hacking group MuddyWater, which has ties to the Iranian regime. This group is also known by several aliases, including Boggy Serpens, Earth Vetala, and Mango Sandstorm. Early versions of DCHSpy were found targeting both English and Farsi speakers, largely utilizing Telegram channels that present narratives contrary to the Iranian government.
Targeting Dissidents and Activists
The use of VPN lures to promote this malware suggests a focus on dissidents, activists, and journalists opposed to the Iranian regime. The spyware’s distribution strategy reflects a calculated approach to use seemingly innocuous apps to target individuals critical of the government, particularly in light of recent geopolitical tensions.
The newly identified variants of DCHSpy are being propagated under the guise of seemingly legitimate services like Earth VPN, Comodo VPN, and Hide VPN. These applications are masked to appear useful, making it easier for the spyware to infiltrate devices.
The Role of Starlink
One notable aspect of this spyware’s distribution involves its connection to Starlink. A sample named "starlink_vpn(1.3.0)-3012 (1).apk" has been identified, suggesting that the malware may be leveraging interest in Starlink’s services. Although Starlink was launched in Iran amidst a government-imposed internet blackout, it was subsequently banned by the Iranian parliament due to unauthorized usage.
Comprehensive Data Collection Features
DCHSpy is a modular trojan designed for extensive data harvesting. It gathers a wealth of information, including account signs, contacts, SMS messages, call logs, location data, ambient audio, photographic content, and WhatsApp messages. This broad data capture threatens the privacy and security of users.
Interestingly, DCHSpy shares infrastructure with another harmful Android malware known as SandStrike, which Kaspersky identified in late 2022 as also targeting Persian-speaking individuals through deceptive VPN applications.
Emerging Patterns of Malware Use
The revelation about DCHSpy adds to the growing list of Android spyware targeting individuals across the Middle East. Other identified malware strains include AridSpy, BouldSpy, GuardZoo, and SpyNote, reflecting a concerning trend of technologically sophisticated surveillance tactics.
Lookout has noted that DCHSpy employs tactics reminiscent of those used by SandStrike, distributing malicious content through URLs shared via messaging platforms like Telegram. This strategy indicates a continuing evolution and development of surveillance software, particularly as the situation in the Middle East remains volatile.
In light of these findings, it is evident that the development and deployment of spyware like DCHSpy must be monitored closely, especially as crackdowns on dissent within Iran increase following recent ceasefire developments.


