Iranian Cyber Espionage Group Deploys DCHSpy Android Malware Disguised as VPN Apps

In the wake of escalating geopolitical tensions, cybersecurity researchers have identified a sophisticated Android spyware campaign attributed to the Iranian state-aligned group known as MuddyWater. This campaign involves the deployment of a surveillance tool named DCHSpy, which masquerades as legitimate Virtual Private Network (VPN) applications to infiltrate targeted devices.

Discovery and Attribution

The mobile security firm Lookout Inc. recently uncovered four new variants of DCHSpy, surfacing shortly after the Israel-Iran conflict intensified in June 2025. MuddyWater, active since at least 2017, is believed to operate under Iran’s Ministry of Intelligence and Security (MOIS). The group’s activities have historically focused on cyber espionage, targeting entities across the Middle East and beyond.

Malware Capabilities

DCHSpy is a modular trojan designed to collect a wide array of sensitive data from infected Android devices. Its capabilities include:

– Harvesting WhatsApp messages
– Accessing account credentials
– Retrieving contact lists
– Intercepting SMS messages
– Logging call details
– Exfiltrating files and photos
– Recording ambient audio
– Capturing location data

These functionalities enable the attackers to monitor communications, track movements, and gather personal information, posing significant privacy and security risks to victims.

Distribution Methods

The latest DCHSpy variants are distributed under the guise of legitimate VPN services, including Earth VPN, Comodo VPN, and Hide VPN. Notably, one sample was found with the filename starlink_vpn(1.3.0)-3012 (1).apk, suggesting an attempt to exploit the popularity of SpaceX’s Starlink satellite internet service. This tactic is particularly insidious, as it targets individuals seeking to circumvent internet restrictions imposed by the Iranian government.

The malware is primarily disseminated through messaging platforms like Telegram, where malicious URLs are shared directly with potential victims. This method leverages the trust users place in these communication channels, increasing the likelihood of successful infections.

Infrastructure and Connections

DCHSpy shares infrastructure with another Android surveillance tool known as SandStrike, previously identified by Kaspersky in November 2022. SandStrike targeted Persian-speaking individuals by posing as benign VPN applications. The overlap in command-and-control servers and distribution methods indicates a coordinated effort by Iranian threat actors to develop and deploy custom-built mobile malware frameworks for intelligence gathering.

Broader Context

The deployment of DCHSpy is part of a broader pattern of political targeting by Iranian advanced persistent threat (APT) groups. These groups have a history of using mobile malware to surveil dissidents, activists, and journalists. For instance, the SandStrike malware was used to target the Baha’i religious minority in Iran, highlighting the regime’s ongoing efforts to monitor and suppress perceived threats.

The use of mobile malware by Iranian threat actors underscores the evolving nature of cyber espionage tactics. By disguising spyware as legitimate applications, these actors exploit the trust users place in familiar services, thereby increasing the effectiveness of their campaigns.

Implications and Recommendations

The discovery of DCHSpy highlights the need for heightened vigilance among users, particularly those in regions with active cyber espionage campaigns. To mitigate the risk of infection, users are advised to:

– Download applications only from official and reputable app stores.
– Be cautious of unsolicited messages containing links or attachments.
– Regularly update device software to patch known vulnerabilities.
– Utilize reputable mobile security solutions to detect and prevent malware infections.

Organizations, especially those operating in high-risk regions, should implement comprehensive cybersecurity measures, including employee training, network monitoring, and incident response planning, to defend against such sophisticated threats.

Conclusion

The emergence of DCHSpy as a tool for state-sponsored surveillance underscores the persistent and evolving threat posed by nation-state actors in the cyber domain. By masquerading as trusted applications, these malware campaigns exploit user trust and the necessity for secure communication tools, thereby facilitating extensive espionage activities. Continuous vigilance, user education, and robust cybersecurity practices are essential to counteract these threats and protect sensitive information from unauthorized access.