Tracking DevilsTongue Spyware Incidents Across Multiple Countries

Researchers have uncovered new infrastructure linked to Israeli spyware vendor Candiru and its advanced DevilsTongue malware, which continues to pose severe threats despite sanctions and legal actions. The spyware is designed to infiltrate high-profile targets such as politicians and journalists, exploiting zero-day vulnerabilities and multiple infection vectors. Insikt Group identified eight infrastructure clusters, with at least five still active in regions including Hungary and Saudi Arabia. Some clusters manage victim-facing systems directly, while others operate through intermediaries or the Tor network. Activity was also traced to Indonesia until late 2024 and to clusters in Azerbaijan, though their status remains uncertain. The findings highlight Candiru’s resilience, sophistication, and persistent ability to threaten global privacy and security.

Technical Description

A joint investigation by Microsoft Threat Intelligence Center and Citizen Lab has uncovered ongoing activity tied to the DevilsTongue spyware, developed by the Israeli-based spyware vendor Candiru (also known as Sourgum). The malware leverages zero-day vulnerabilities in Windows and common web browsers to infiltrate targeted systems. Despite previous patches and takedown efforts, Candiru’s spyware infrastructure remains active and continues to pose a high risk to political, human rights, and media sectors globally.

The DevilsTongue spyware is delivered through sophisticated exploit chains that take advantage of vulnerabilities in Windows operating systems and widely used web browsers. Once deployed, it provides attackers with deep access to infected devices, enabling the theft of sensitive files, communications, and credentials. The spyware can decrypt and exfiltrate Signal messages, extract stored cookies and login data from browsers such as Internet Explorer, Chrome, Safari, Firefox, and Opera, and harvest credentials directly from LSASS. It also has the ability to access and exfiltrate data from popular online platforms including Twitter, Gmail, Yahoo, Facebook, Vkontakte, Mail.ru, and Odnoklassniki. Beyond passive collection, DevilsTongue can impersonate compromised victims by distributing malicious links to their contacts across social platforms, further expanding its reach. Supporting this activity is an extensive command-and-control infrastructure, with over 750 domains mimicking legitimate organizations such as media outlets, advocacy groups, and civil society movements like Black Lives Matter and Amnesty International, which serve both as infection vectors and control channels.

Malware Capabilities:

DevilsTongue is a stealthy, modular spyware framework with both user-mode and kernel-mode components. Its multi-threaded architecture allows operators to load different modules based on the target environment, enabling flexible reconnaissance and surveillance activities. The spyware can perform a wide range of actions, including system profiling, credential harvesting, and monitoring of communications, making it a powerful tool for long-term surveillance operations.

Persistence and Evasion:

To maintain persistence, DevilsTongue leverages COM hijacking, overwriting legitimate registry keys to ensure execution at system startup. For evasion, it abuses a signed third-party driver (physmem.sys) that grants kernel-level memory access and facilitates API call proxying. This technique helps the malware bypass traditional security solutions, complicating detection and forensic analysis.

Data Exfiltration:

Once deployed, DevilsTongue prioritizes extensive data theft. It can steal credentials, browser session data, and sensitive communications, including encrypted messages from platforms such as Skype, Outlook, Telegram, Facebook, Gmail, and Signal. Stolen information is securely transmitted back to attacker-controlled command-and-control (C2) infrastructure, enabling continuous monitoring of victims.

Initial Access Vectors:

Candiru operators employ multiple infection vectors to deploy DevilsTongue, including spearphishing emails, watering hole attacks, malicious documents, and social engineering with weaponized links. In some cases, attackers have also relied on man-in-the-middle attacks or direct physical access to deliver payloads. These techniques are tailored to the victim profile, often targeting high-value individuals in government, media, and civil society.

Zero-Day Exploitation:

DevilsTongue has a history of leveraging zero-day vulnerabilities to gain initial access and maintain stealth. Documented examples include:

  • Google Chrome Remote Code Execution – CVE-2021-21166 and CVE-2021-30551.
  • Internet Explorer Remote Code Execution – CVE-2021-33742, delivered via malicious Office documents.
  • WebRTC Heap Buffer Overflow in Google Chrome – CVE-2022-2294, exploited to execute attacker shellcode.

Conclusion:

The DevilsTongue spyware represents a highly advanced and persistent surveillance threat, leveraging zero-day vulnerabilities, sophisticated persistence mechanisms, and extensive data exfiltration capabilities. Despite multiple exposures and security patches, the spyware continues to evolve, enabling its operators to infiltrate high-value targets such as politicians, journalists, and human rights defenders. Its modular design, stealth techniques, and abuse of legitimate drivers underscore the growing risks posed by commercial spyware vendors. Organizations and individuals in sensitive sectors must remain vigilant, apply security updates promptly, and adopt proactive threat-hunting measures to mitigate this evolving threat.

Impact

DevilsTongue poses a significant threat to high-profile individuals, including politicians, journalists, diplomats, academics, and activists, by compromising their privacy and security. Its modular design and stealth capabilities allow attackers to exfiltrate sensitive data such as communications, credentials, and files without detection. The spyware’s infrastructure spans multiple countries, including Hungary, Saudi Arabia, and Indonesia, highlighting its operational reach and resilience. By targeting individuals of strategic interest, DevilsTongue undermines trust, media freedom, and institutional security. Its continued activity underscores the growing risk posed by commercial spyware and the need for robust detection and mitigation measures.

IOC and Context Details

Topics Details
Tactic Name Exfiltration, Persistence, Execution, Resource Development, Defense Evasion, Credential Access, Discovery, Initial Access
Technique Name Exfiltration: Exfiltration Over C2 Channel
Persistence: Modify Registry
Execution: Exploitation for Client Execution
Resource Development: Acquire Infrastructure
Defense Evasion: Process Injection
Credential Access: Credentials from Password Stores
Discovery: Browser Information Discovery
Initial Access: Exploit Public-Facing Application
Sub Technique Name Resource Development: Acquire Infrastructure – Domains, Virtual Private Server, Server
Defense Evasion: Process Injection – Dynamic-link Library Injection
Credential Access: Credentials from Password Stores – Credentials from Web Browsers
Attack Type Social Engineering Malware
Targeted Applications Windows
Region Impacted Singapore, United Kingdom, Armenia, Azerbaijan, Hungary, Indonesia, Iran, Israel, Lebanon, Saudi Arabia, Spain, Turkey, United States, Yemen
Industry Impacted Government, Broadcast Media Production and Distribution
IOC’s Hashes:
SHA-256: 255869de85e2a171993fc5eb8a556d873a1b8966e040f6f55926f2fa2d595cc8
SHA-1: 25dcd94d688ecdb800157378dbae03f30b2a8ba4
MD5: e33cfc9e285729c09e77df9e426587ab

Domains:
salmonpride[.]net, concretebottle[.]com, notableexam[.]org, notionnowadays[.]com, parkourbus[.]com, goatsandals[.]com, golfconcert[.]com, suggestutterly[.]com, browniebell[.]com, measurecabin[.]com, prawnbasket[.]com, kartingrumble[.]com, profligatecensure[.]com, rollstrech[.]com, tidalscreen[.]com, pressaviation[.]com, fileswaper[.]com, sacrificeprincipal[.]net, tacticscheap[.]net, selectedpazzle[.]com, outdooutcome[.]com, spongefruit[.]com, bronzemonth[.]com, calmbase[.]org, journeyjest[.]net, penslice[.]com, stylebrakedown[.]com, sunsetpotential[.]com, maturitygenesis[.]com, guitarcalculate[.]com, strangegarden[.]org, labyrinthextravagance[.]org, beneathbreadth[.]com, dumplingbell[.]com, leafconfuse[.]net, macrodrop[.]net, blockroster[.]net, ultimatematter[.]info
CVE NA

Recommended Actions

  • Apply Microsoft Security Updates for CVE-2021-31979 and CVE-2021-33771 immediately.
  • Use Windows 10 security features such as Credential Guard to block credential theft.
  • Adopt network segmentation and restrict outbound traffic to prevent C2 communications.
  • Exercise caution with untrusted links — open suspicious URLs in isolated environments/VMs.
  • Monitor browser and credential access logs for abnormal activity.
  • Conduct threat hunting for connections to suspicious infrastructure domains.

References

https://www.recordedfuture.com/research/tracking-candirus-devilstongue-spyware