A new Android spyware break was detailed on Tuesday by Kaspersky lab, a Russian firm. The belief is the originator was an Italian vendor. The new technique enables Android phones to be infiltrated silently, and WhatsApp messages siphoned off. This appears to be an extremely advanced type of malware, and the target is Google’s operating system. Although the Italian company was not named by Kaspersky, the code of the spyware referenced the Negg based in Rome.

Versions of the Negg’s website have been archived, and app development services and cybersecurity were provided by the company. Surveillance tools were not advertised, but there were videos showing how to fight crime and collect computer evidence. iOS and Android engineers were sough by the company in 2015, provided the applicants were knowledgeable regarding malware analysis. According to two sources, Negg’s work was in Italy, and the company was small.


Only a few infections were found by Kaspersky, and they were all in Italy. The software is being called Skygofree, and one of the most powerful the Android operating systems have ever seen. The payload structure is complex, root privileges are gained using multiple exploits, and the surveillance features are unknown. For additional details, visit Forbes.com.

It is believed the development began in 2014. When Kaspersky saw the surveillance tech in 2017, the attacker could already force the device targeted to connect to specific Wi-Fi networks, and record audio under the right circumstances. The Android Accessibility Service is used by the payload to get information once the application targeted has been launched, and text messages can be located.

A route is provided by Accessibility services leading to additional applications. An application programming interface is used by anyone with authorization. A few websites received delivery of this tool, including bogus updates for network pages. In 2015, the telecom giants Vodafone and Three registered. A windows implant was also found by Kaspersky. The design was identified as 2017, and no infected PC’s were located.

Most users have no reason to fear Skygofree because the use is limited to the lawful intercept market. Law enforcement officers world wide use this type of tool after receiving permission from the courts. Despite the fact the Skygofree software seems to be limited in Italy, Vicente Diaz, a researcher at Kaspersky, believes governments all over the globe will start investing in similar tools to enable them to spy on Androids and smartphones.