Italian spyware maker SIO still developing and distributing Spyrtacus.

9 April 2026 - Research

We analyzed a 2025 sample of the Spyrtacus spyware, version 8.71. Among its capabilities it can record the screen and take screenshots, record voice calls, export WhatsApp messages, upload files, and dynamically execute downloaded modules. We confirm attribution to SIO S.p.A. and provide a small set of IoCs to detect infections of this malware family.

Flowchart of the infection, control, and collection process
Flowchart of the infection, control, and collection process

The Spyware #

Infection Method

As like the majority of low-cost spyware, infection starts by receiving an SMS instructing the victim to install a carrier‑provided app to keep their mobile service working. The SMS contains a tinyurl.com shortened link, which, after a series of redirects, points to a phishing page that mimics the victim’s mobile provider website. The threat actor maintains pre‑made pages for all major Italian carriers.

In this case the URL displays a page that imitates ho. mobile (ho‑mobile.it) and offers a download link to the malicious APK.

The application itself pretends to be the ho. mobile official app, advertising a new 5G promo. This tactic is common among low‑cost spyware families that rely on coercing users into installing malicious apps rather than employing sophisticated exploit chains.

Screenshot of the app information
Screenshot of the app information

The Agent

In our case the application used the package name com.elysium.core, while its main activity was named it.taog.app.MainActivity. The application manifest reports versionCode="871" and versionName="8.71".

The app is signed with a key belonging to:

CN=Aziz Oukil, OU=Unknown, O=Unknown, L=Sant'Anastasia, ST=NApoli, C=IT

It is obfuscated with DexGuard 9.x. However, a string containing spyrtacus-agent can be found in the resources.

The Spyrtacus name is not new; this sample is likely a newer variant of the well‑known agent used by SIO.

During its first run the malware gathers device information, including IMEIs, and sends everything to a Dispatcher server via the /Dispatcher/GetParams endpoint. If no errors occur, the Dispatcher returns a set of parameters that enable or disable the spyware’s features.

Some of the parameters control whether the malware:

  • uses FTP to collect files (and whether those files are encrypted),
  • records ambient audio,
  • takes screenshots at a configurable interval, and
  • installs a legitimate app as a second stage from the Google Play

The malware can also download additional remote modules. The modules are AES‑encrypted DEX files that are loaded from memory through Android’s InMemoryDexClassLoader. The key to decrypt the modules is retrieved along with other parameters from the Dispatcher.

It is worth noting that in our sandboxed analysis we kept our sample offline, so we could not retrieve any of the module payloads.

During the onboarding process the Dispatcher server also returns the IP address of a Command‑and‑Control (C2) server that the agent will use thereafter. The C2 is then reached via a multitude of protocols including FTP, MQTT(S), HTTP(S), and Google’s Firebase services.

Screenshot of the app permissions
Screenshot of the app permissions

Attribution

To validate the server’s certificate, the agent loads a key store embedded in the res/raw/ks file. The key store contains the following Issuer line:

C=IT, CN=Artemide/Spartacus, L=Roma, O=Coliseum, ST=Unknown, OU=Lotta Greco‑Romana

The same certificate is being served from an IP address belonging to AS206173 (an ISP named “NAVIGAZIONE INTERNET”, i.e., “Internet Connectivity”). This ASN is registered to SIOPLUS S.R.L. (VAT ID 10253360969), a subsidiary of SIO S.p.A..

All of SIO subsidiaries
All of SIO subsidiaries

To further confirm the attribution, we downloaded the favicon of one of the C2 servers.

The C2 favicon:

Favicon from a Spyrtacus C2 server
Favicon from a Spyrtacus C2 server

And the favicon from asigint[.]it, another SIO subsidiary:

Favicon from the official Asigint website
Favicon from the official Asigint website

Extras

As we anticipated, the application uses Google’s Firebase services, which is common for most Android apps because Firebase is ubiquitous on the platform.

In the context of spyware, however, this is noteworthy since it leaks to Google the correlation between spyware infection and the victims’ Google identity.

The following are the Firebase projects used by Spyrtacus:

https://assist-online.firebaseio.com
https://dusty-apricot.firebasestorage.app

To further corroborate the attribution, and in line with what TechCrunch previously reported about the Neapolitan dialect found in the spyware’s comments, we uncovered the following strings in the binary:

  • LA CODA INVIO E' VUOTA -- STATT BBUON
  • PARAMETRI CONNESSIONE RICEVUTI -- SCATENATE L'INFERNO!

These strings reflect the developers’ native‑language comments and further tie the sample to the known SIO‑related code base.

Previous Samples & Analysis #

In the past other Spyrtacus samples were analyzed, in particular see the following list:

Version 8.65 from October 2024

Version 8.20 from April 2022

Version unknown from 2019

Apparently, a newer version of the spyware agent 8.72 exists, as documented: https://www.lawfulinterceptionacademy.eu/clir/.

IoCs #

IPs:

  • 5.56.12.150
  • 89.46.67.218

Domains:

  • supporto-mobile.it
  • srv.servicemnt.com

Android package names:

  • com.elysium.core
  • it.taog
  • org.util.carriersvc
  • sys.base.service

C2 favicon SHA256 hash:

  • ef2e1c47166fe0c5ab3bf5216baf6ad6b96f759e15ac218d1a1a3cdcc9e0994f

Conclusion #

As previously stated, and as supported by many NGOs, mercenary spyware should simply not exist. We reiterate the call to ban these tools and hold their operators and developers accountable, and we continuously advocate for that through our contributions and participation in the EDRi network.

You’ve read an article from the Research section, where we share the results of our technical and social investigations into networks, security, and surveillance, with the goal of deep understanding and public knowledge creation.

We are a non-profit organization run entirely by volunteers. If you value our work, you can support us with a donation: we accept financial contributions, as well as hardware and bandwidth to help sustain our activities. To learn how to support us, visit the donation page.

Recent articles