The Russian state-sponsored APT group Gamaredon, also known as Primitive Bear or Shuckworm, has been identified deploying two new Android spyware families named BoneSpy and PlainGnome. This marks the first instance of Gamaredon using mobile-only malware. These tools are designed for extensive surveillance, targeting Russian-speaking individuals in former Soviet states, which include countries such as Uzbekistan, Kazakhstan, Tajikistan, and Kyrgyzstan. BoneSpy has been operational since at least 2021, while PlainGnome first appeared in 2024, and both are currently active. Lookout researchers assess this targeting may be related to the worsening relations between these countries and Russia since the invasion of Ukraine.
BoneSpy and PlainGnome are capable of collecting a wide range of data such as SMS messages, call logs, phone call audio, photos from device cameras, device location, and contact lists. BoneSpy is derived from the Russian open-source DroidWatcher app, whereas PlainGnome is custom-built and utilizes a two-stage deployment process, where the initial stage installs a minimal app requesting permissions to drop the malicious payload. This allows them to exfiltrate data once a device is idle, evading detection. Gamaredon’s use of dynamic DNS providers is consistent with their known tactics for desktop campaigns, helping attribute these tools to them, with infrastructure overlaps indicating command and control domains for both mobile and desktop activities.