SYMBOLCOMMON_NAMEaka. SYNONYMS
apk.kospy (Back to overview)

KoSpy

Actor(s): APT37


According to Lookout, this spyware was first observed in March 2022 and remains active with new samples still publicly hosted. It uses a two-stage C2 infrastructure that retrieves initial configurations from a Firebase cloud database. KoSpy can collect extensive data, such as SMS messages, call logs, location, files, audio, and screenshots via dynamically loaded plugins. The spyware has Korean language support with samples distributed across Google Play and third-party app stores such as Apkpure.

References
2025-03-12LookoutLookout
Lookout Discovers New Spyware by North Korean APT37
KoSpy

There is no Yara-Signature yet.