LightSpy Malware Gains Control Over Multiple Platforms

LightSpy Malware Gains Control Over Multiple Platforms

LightSpy malware has expanded its capabilities, now supporting over 100 commands across Windows, macOS, Linux, and mobile devices. According to a recent report, this advanced spyware can now extract data from Facebook and Instagram, increasing its surveillance potential. As a result, cybercriminals can access sensitive user information more efficiently.

Originally discovered in 2020, LightSpy has evolved significantly. The spyware can now steal Wi-Fi details, call logs, messages, browser history, and app data. Furthermore, it captures screenshots, records audio, and even extracts login credentials from various messaging platforms.

How LightSpy Malware Works

Recent research highlights how LightSpy operates. Cybercriminals use command-and-control (C2) servers to manage infected devices remotely. The latest version shifts focus from simple data theft to complete system control. For example, new commands allow attackers to track plugin versions, manage transmissions, and monitor social media activity.

One alarming discovery is LightSpy’s new targeting method. Attackers have removed destructive iOS plugins while adding commands that steal Facebook and Instagram data from Android devices. This change allows cybercriminals to extract private messages, contacts, and metadata without alerting victims.

Expanded Surveillance Across Platforms

LightSpy now includes 15 Windows-specific plugins. These focus on keylogging, audio recording, and USB interactions. Additionally, attackers have access to an admin panel that enables them to control infected mobile devices remotely. This means cybercriminals can manipulate compromised devices without the user’s knowledge.

At the same time, another Android malware called SpyLend has surfaced. This malware disguises itself as a finance app but actually engages in blackmail and extortion. It harvests user data and enforces predatory lending practices. Security experts warn that such threats are increasing, making it essential for users to stay vigilant.

How to Prevent Spyware Attacks

To protect against LightSpy and similar malware, users should take the following precautions:

  • Avoid downloading unknown apps from third-party sources.
  • Regularly update software to patch security vulnerabilities.
  • Use strong passwords and enable multi-factor authentication (MFA).
  • Check app permissions carefully before granting access.
  • Install reputable security software to detect potential threats.

Since spyware continues to evolve, staying informed is crucial. Businesses and individuals must improve cybersecurity measures, update policies, and educate users about emerging threats. By following these steps, they can significantly reduce the risk of infection.