Cyber Security Experts Just Discovered A New Trojan Targeting Android Users
Sundar Pichai - Oct 05, 2019
Monokle attacks targeted Android devices through counterfeit applications, compromising the devices’ passwords, PINs, or locking patterns.
- These Are Must-Have Apps For Rooted Android Phones
- Build Your Own App And Earn Money With The Complete Android 11 Developer Bundle
- How To View Messages When Your Phone Screen Is Broken
Nation-state mobile attacks are on the rise, pressurizing countries, as well as enterprises, to build sufficient security infrastructure that protects against the growing threat of mobile surveillanceware. Pegasus, a spyware invading the operating system of Apple mobile devices, was discovered in 2016. Through a malicious link, Pegasus is able to read text messages, tracking calls, collecting passwords, and interfering with other activities on infected phones, thus compromising users’ privacy.
Mobile surveillanceware becomes more complicated as with the development of antivirus tools and malware detection software. Recently, Monokle appears as a great example of an advanced mobile malware that is described as “never seen in the wild before.”

Monokle was discovered by Lookout, a private IT security company based in California. It is a part of several targeted campaigns carried out by Russian firm Special Technology Center (STC), according to Lookout experts. The firm has been sanctioned by the US Government for having interference in the 2016 US Presidential Elections.

How dangerous is Monokle?
Monokle was discovered by Lookout, a private IT security company based in California. It is part of several targeted campaigns carried out by the Russian firm Special Technology Center (STC), according to Lookout experts. The firm has been sanctioned by the US Government to have interference in the 2016 US Presidential Elections.

As described, Monokle attacks targeted Android devices through counterfeit applications of Skype, Google Play, and more. Aiming to steal personal information, it compromises the devices’ passwords, PIN, or pattern during a screen unlock event. Novel techniques make it more effective to exfiltrate data from third-party apps without root access. Above that, the surveillanceware employs predictive-text dictionaries which interpret interested topics to a targeted device.
Particularly, Monokle is found in a limited set of applications, implying that the malware attacks highly targeted devices. Users will have no doubt when downloading fake apps due to their legitimate functionality.

For these capabilities, Monokle is posing a major security risk for Indian mobile users, including both iOS and Android devices, as said by a senior government official.
About the Special Technology Center (STC)
In 2016, the Special Technology Center (STC) is supposed to provide material support for an alleged party that has interference in the 2016 US Governmental Elections. Specifically, the company has been supplying Radio Frequency (RF) and Unmanned Aerial Vehicles (UAVs) equipment for the Russian military, as well as other customers of the government.

Through STC’s connection to its own antivirus software named Defender that Lookout recognized it as the developer of Monokle. STC also develops other Android security software, both offensive and defensive, that stands the chance of surveillance.
Featured Stories
Features - Jul 01, 2025
What Are The Fastest Passenger Vehicles Ever Created?
Features - Jun 25, 2025
Japan Hydrogen Breakthrough: Scientists Crack the Clean Energy Code with...
ICT News - Jun 25, 2025
AI Intimidation Tactics: CEOs Turn Flawed Technology Into Employee Fear Machine
Review - Jun 25, 2025
Windows 11 Problems: Is Microsoft's "Best" OS Actually Getting Worse?
Features - Jun 22, 2025
Telegram Founder Pavel Durov Plans to Split $14 Billion Fortune Among 106 Children
ICT News - Jun 22, 2025
Neuralink Telepathy Chip Enables Quadriplegic Rob Greiner to Control Games with...
Features - Jun 21, 2025
This Over $100 Bottle Has Nothing But Fresh Air Inside
Features - Jun 18, 2025
Best Mobile VPN Apps for Gaming 2025: Complete Guide
Features - Jun 18, 2025
A Math Formula Tells Us How Long Everything Will Live
Features - Jun 16, 2025
Comments
Sort by Newest | Popular