Get all your news in one place.
100’s of premium titles.
One app.
Start reading
Axios
Axios
World
Joe Uchill

Russian contractor tied to 2016 election interference unleashes mobile phone spyware

A Russian military contractor tied to 2016 U.S. election interference is behind a spate of mobile phone surveillance programs, researchers at Lookout mobile security have determined.

Driving the news: The mobile spyware, dubbed Monokle, was disguised as several different Android apps — ranging from pornography to Google. Monokle may have been in use since 2015.


The targets: Some of the fake apps were intended for highly specialized audiences, which may give a sense of some of the intended targets.

  • A fake version of “UzbekChat” appears to be intended for people in or communicating with Uzbekistan.
  • A fake program called "Ahrar Maps" appears to be targeted at the Ahrar al-Sham militant group in Syria.
  • A fake app titled "Caucas" appears to target the Caucasus region.

The attacker: Lookout says Monokle uses the same private internet infrastructure as an antivirus product developed by Special Technology Centre, Ltd. (STC), a Russian military contractor sanctioned by the Obama administration for its role in 2016 election tampering.

  • Two developers' names and the name "Monokle" are referenced in the code for Monokle.
  • There is evidence that an iOS version is being developed.

Unique features: Monokle is able to change security certificates on cellphones, giving STC the ability to alter data being sent to and from the phone.

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.