New Android Spyware “BouldSpy” Linked to Iran’s Law Enforcement Command

In recent years, cyber espionage has become an increasingly common method of gathering intelligence, and governments worldwide have invested substantial amounts of effort and resources into developing powerful malware strains to facilitate their operations. One such malware strain that has come into the spotlight is BouldSpy. Researchers at the Lookout Threat Lab have recently detected this malicious software and linked it to Iran’s Law Enforcement Command of the Islamic Republic of Iran with moderate certainty.

Ransomware code speculated to be inactive

One of the critical aspects of BouldSpy is its ransomware code, which has been speculated to be inactive. This means that while the software may be capable of encrypting essential data on infected devices, it cannot be used to extort money from affected individuals. However, the malware’s primary purpose still focuses on espionage, which is its ability to collect critical data remotely.

BouldSpy targeted specific individuals and groups

In analyzing exfiltrated data from BouldSpy’s command and control (C2) servers, Lookout’s researchers discovered that this malware has targeted over 300 individuals. The primary targets of BouldSpy are the Iranian Kurds, Azeris, and Christian Armenian groups. This result shows that BouldSpy’s espionage activities have been focused on individuals who are likely to be of interest to the Iranian regime.

Events during BouldSpy’s peak operations

The malware’s tactics and targets indicate that BouldSpy’s activities are politically motivated. During the peak of the Mahsa Amini protests in late 2022, a significant portion of the malware’s operations was observed. This occurrence indicates that the Iranian regime is likely using the malware to monitor and suppress political dissent and protests, and BouldSpy is being leveraged as a tool to help achieve that goal.

Given the limited number of samples available to security researchers and the lack of maturity regarding its operational security, it is presumed that BouldSpy is a novel malware strain. The absence of key features serves as additional evidence of its novelty. This fact could mean that Iran’s Law Enforcement Command has invested a significant amount of resources in developing this particular malware strain.

BoldSpy’s espionage activities have been designed to occur primarily in the background. The malware takes advantage of Android accessibility services to gather data remotely from infected devices without attracting attention. This means that targeted individuals may not be aware that their devices have been compromised, and their data has been stolen without their consent.

In addition to operating primarily in the background, BoldSpy depends on creating a CPU wake lock and deactivating battery management functionality. This strategy is to ensure that the malware’s operations continue uninterrupted, and the infected devices remain available for surveillance for as long as possible.

BouldSpy can encrypt files for exfiltration, but communication between victim devices and the C2 occurs over unencrypted web traffic. This lack of security exposes victims’ data to interception by third parties, including other attackers or law enforcement agencies. Additionally, the threat actor’s insecure implementation exposes the entire C2 communication in clear text, making it much easier for network analysis and detection.

BouldSpy is a novel malware strain suspected to have a link with Iran’s Law Enforcement Command. The malware’s primary espionage activities occur in the background, and it employs various strategies to avoid detection, such as creating a CPU wake lock and disabling battery management. Although the ransomware code in BouldSpy is inactive, its ability to remotely collect critical data makes it a significant cybersecurity threat. To protect their devices from such sophisticated malware attacks, individuals and organizations must adopt a proactive approach.

Explore more

Resilience Becomes the New Velocity for DevOps in 2026

With extensive expertise in artificial intelligence, machine learning, and blockchain, Dominic Jainy has a unique perspective on the forces reshaping modern software delivery. As AI-driven development accelerates release cycles to unprecedented speeds, he argues that the industry is at a critical inflection point. The conversation has shifted from a singular focus on velocity to a more nuanced understanding of system

Can a Failed ERP Implementation Be Saved?

The ripple effect of a malfunctioning Enterprise Resource Planning system can bring a thriving organization to its knees, silently eroding operational efficiency, financial integrity, and employee morale. An ERP platform is meant to be the central nervous system of a business, unifying data and processes from finance to the supply chain. When it fails, the consequences are immediate and severe.

When Should You Upgrade to Business Central?

Introduction The operational rhythm of a growing business is often dictated by the efficiency of its core systems, yet many organizations find themselves tethered to outdated enterprise resource planning platforms that silently erode productivity and obscure critical insights. These legacy systems, once the backbone of operations, can become significant barriers to scalability, forcing teams into cycles of manual data entry,

Is Your ERP Ready for Secure, Actionable AI?

Today, we’re speaking with Dominic Jainy, an IT professional whose expertise lies at the intersection of artificial intelligence, machine learning, and enterprise systems. We’ll be exploring one of the most critical challenges facing modern businesses: securely and effectively connecting AI to the core of their operations, the ERP. Our conversation will focus on three key pillars for a successful integration:

Trend Analysis: Next-Generation ERP Automation

The long-standing relationship between users and their enterprise resource planning systems is being fundamentally rewritten, moving beyond passive data entry toward an active partnership with intelligent, autonomous agents. From digital assistants to these new autonomous entities, the nature of enterprise automation is undergoing a radical transformation. This analysis explores the leap from AI-powered suggestions to true, autonomous execution within ERP