Recent cybersecurity investigations have unveiled DCHSpy, a sophisticated Android spyware campaign tied to Iran's Ministry of Intelligence and Security (MOIS). Masquerading as legitimate VPN tools and Starlink connectivity apps, this malware is engineered to infiltrate devices of individuals deemed adversaries of the Iranian regime.
DCHSpy is attributed to the Iranian state-sponsored threat group MuddyWater, also known under aliases such as:
The spyware was first flagged by Lookout Security in July 2024, shortly after heightened tensions between Israel and Iran.
starlink_vpn(1.3.0)-3012 (1).apk
DCHSpy is a modular Android trojan capable of extensive surveillance operations, including:
The rise of DCHSpy aligns with escalating digital repression in Iran, following the Israel-Iran conflict and subsequent partial ceasefire.
This indicates a wider strategy of mobile surveillance targeting civil society actors across the Middle East.
The DCHSpy campaign exemplifies how nation-state actors exploit popular digital privacy tools to execute covert surveillance. By posing as VPN and Starlink apps, Iranian operatives are targeting vulnerable communities seeking secure communication.
DCHSpy is Iranian-linked Android spyware disguised as VPN and Starlink apps, used for surveillance.
It is typically distributed via Telegram and sideloaded through malicious APK files.
The malware is attributed to MuddyWater, a cyber-espionage group linked to Iran's Ministry of Intelligence and Security.
It can extract contacts, WhatsApp data, SMS, call logs, photos, ambient audio, and GPS location.
Use apps only from official sources, be wary of unexpected downloads, and install reputable mobile security software.
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights delivered to your inbox.