Hermit: State-Backed Mobile Spyware Used in Targeted Surveillance Campaigns

Hermit is a modular spyware toolkit for Android and iOS, designed to enable state-level actors to surveil targets with full access to their mobile devices. It allows attackers to read messages, listen to calls, access files, and control hardware like the microphone and camera. Discovered in active use in multiple countries, Hermit is developed by Italian spyware vendor RCS Lab, which markets surveillance capabilities to government clients.

Introduction to Hermit

Hermit typically infects smartphones through SMS phishing, fake app downloads, or zero-day exploit delivery, often requiring the victim to install an app that masquerades as a legitimate service (e.g., telecom provider support). Once installed, it connects to attacker-controlled servers to download additional spyware modules and begins harvesting data in real time. Its use has been documented in politically sensitive regions, where it has reportedly been deployed against dissidents, journalists, and human rights defenders.


1. How Hermit Works

Infection Mechanism:
Hermit is deployed via:

The attacker often impersonates a trusted brand, like a mobile carrier, to increase success.

Payload Execution:
Once the Hermit app is installed:


2. History and Notable Campaigns

Origin and Discovery:
Hermit was publicly analyzed in 2022 by Lookout and Google’s Threat Analysis Group (TAG). It was traced back to RCS Lab, a surveillance vendor headquartered in Italy with ties to telecom-focused spyware development.

Notable Campaigns:


3. Targets and Impact

Targeted Victims and Sectors:
Hermit targets individuals in:

Consequences:


4. Technical Details

Payload Capabilities:

Evasion Techniques:


5. Preventing Hermit Infections

Best Practices:

Recommended Security Tools:


6. Detecting and Removing Hermit

Indicators of Compromise (IoCs):

Removal Steps:

  1. Factory reset the device to eliminate persistent spyware
  2. Change all credentials, especially for messaging, email, and cloud services
  3. Avoid restoring from backups that may include the infected app
  4. Monitor for ongoing suspicious behavior and verify SIM/network configuration
  5. Seek help from cybersecurity professionals or civil society digital safety organizations

Professional Help:
For journalists, activists, or political figures, contact Access Now, Citizen Lab, or Amnesty International for forensic assistance and safe device handling.


7. Response to a Hermit Infection

Immediate Steps:


8. Legal and Ethical Implications

Legal Considerations:
Hermit has been tied to state-sponsored surveillance, raising serious questions around legal export controls, international human rights laws, and violations of privacy regulations. The vendor, RCS Lab, has faced investigations in Europe for misuse of its spyware platform.

Ethical Considerations:
Hermit’s deployment illustrates how commercial spyware can be misused for political repression. It raises deep ethical concerns about the sale of surveillance technology to repressive regimes, often with little oversight or accountability.


9. Resources and References


10. FAQs about Hermit

Q: What is Hermit spyware?
A commercial surveillance tool targeting Android and iOS devices, designed to steal data and control device functions remotely.

Q: Who uses Hermit?
Primarily state actors and government agencies, often in politically sensitive or authoritarian environments.

Q: How does Hermit spread?
Through phishing SMS, fake apps, and sometimes exploits delivered via malicious links or MITM attacks.

Q: Can it be removed?
Yes — but only through a factory reset and full reconfiguration. For high-risk cases, forensic help is recommended.


11. Conclusion

Hermit represents the growing threat of commercial spyware targeting mobile users worldwide. While advertised as a lawful surveillance tool, its real-world use shows how quickly these platforms can be turned against civil society. Protecting against threats like Hermit requires tech safeguards, strong policies, and global accountability for spyware vendors and their clients.

 

 

« Back to the Virus Information Library

« Back to the Security Center