QuantorPhone

SmartScan — Mobile Network Forensic Analysis

Real-time detection of state-level mobile threats. SmartScan captures all device network traffic through a secure WireGuard tunnel and processes it with a 12-engine analysis pipeline to identify spyware command-and-control beacons, data exfiltration channels, and covert surveillance infrastructure — all without requiring device root, MDM enrollment, or filesystem access.

12Analysis engines 3Scan modes 0Root required E2EEncrypted pipeline

SmartScan is designed for law enforcement forensic units, counter-intelligence teams, diplomatic security services, and any organization that needs to verify device integrity against commercial spyware such as Pegasus (NSO Group), Predator (Intellexa/Cytrox), and Graphite (Paragon Solutions). Classification: TLP:GREEN for this page — no IOC data is disclosed. Specific indicators are shared only under NDA at TLP:AMBER.

Threat Landscape

Commercial spyware platforms used by state actors follow a predictable operational pattern:

  1. Delivery — Zero-click exploits via messaging apps, network injection (MITM at carrier level), or physical access during device seizure.
  2. Implant persistence — Kernel-level or application-level persistence depending on platform capability and target OS version.
  3. Command & Control (C2) — The implant establishes periodic beacons to C2 infrastructure, typically disguised within legitimate protocol traffic (HTTPS to cloud providers, WebSocket over CDN, DNS over HTTPS).
  4. Data exfiltration — Captured data (messages, calls, location, camera, microphone) is uploaded in compressed, encrypted chunks to staging servers, often through multiple proxy layers.
Key insight: While zero-click delivery is invisible to the user, the C2 communication and exfiltration phases always generate network traffic that can be detected through behavioral analysis, protocol fingerprinting, and destination intelligence — even when payloads are encrypted. This is SmartScan's detection surface.

Detection Patterns (Generic — No IOCs)

SmartScan engines detect the following behavioral patterns without relying on specific IOC signatures:

PatternWhat it revealsEngine(s)
High-entropy payloads to low-reputation ASNsEncrypted exfiltration to non-standard infrastructureEntropy, IP Reputation, GeoIP
TLS ClientHello fingerprint anomalies (JA3/JA4)Non-browser TLS stacks used by implant librariesTLS Fingerprinting
DNS queries with high subdomain entropyDGA-based C2 resolution or DNS tunnelingDNS Analysis
Periodic beaconing with fixed intervals (±jitter)Automated C2 heartbeat patternBehavioral, Suricata
Certificate chain anomalies (self-signed, short-lived, wildcard)Rogue TLS infrastructure for interception or C2Certificate Validation
Protocol-port mismatch (e.g., non-HTTP on 80/443)Tunnel protocol abuse for C2 channel hidingProtocol Analysis
Large asymmetric upload burstsBulk data exfiltration sessionsBehavioral, Covert Channel
Connections to jurisdictions inconsistent with user profileC2 infrastructure geolocation anomalyGeoIP Analysis

Capture & Analysis Pipeline

SmartScan operates as a network-level forensic tool. The full pipeline runs without any access to the device filesystem, application sandbox, or OS internals:

Pipeline Steps

  1. Authentication — Device authenticates via Auth0 Device Authorization Grant (RFC 8628). No passwords stored on device; token refreshed per-session. Server validates JWT signature, audience, and expiry.
  2. Tunnel establishment — WireGuard GoBackend creates a full-tunnel VPN (0.0.0.0/0 route) using Curve25519 key exchange and ChaCha20-Poly1305 encryption. All device traffic routes through the analysis server.
  3. Traffic capture — Server-side tcpdump captures all traffic on the WireGuard interface (wg0) for the configured duration (60–600 seconds). PCAP is stored server-side with AES-256 at rest.
  4. Parallel analysis — 12 engines process the PCAP simultaneously. Each engine produces an independent alert set with severity classification.
  5. Cross-engine correlation — The correlation engine aggregates alerts across all engines, de-duplicates, and applies weighted scoring to produce a unified threat assessment.
  6. Report generation — Forensic report is compiled with severity-classified alerts (HIGH / MODERATE / LOW), executive summary, and per-engine detail sections.
  7. Secure delivery — Report is delivered to the device via HTTPS with TLS certificate pinning (SHA-256). Report can be viewed in-app or exported as PDF.
Privacy by design: SmartScan never decrypts application-layer traffic. Analysis operates on metadata, flow characteristics, protocol fingerprints, and destination intelligence. The PCAP contains encrypted payloads only — SmartScan cannot and does not read message content, calls, or media.

12-Engine Analysis Matrix

Each engine operates independently and produces its own alert set. The cross-engine correlator then fuses results for final severity scoring.

Severity Classification

HIGH Confirmed spyware pattern match or multi-engine correlation above threshold. Immediate investigation recommended.
MODERATE Suspicious behavior detected by 2+ engines. Review recommended within 24h.
LOW Single-engine anomaly or informational finding. Logged for baseline comparison.

Engine Technology Stack

Suricata 8.0 IDS

Signature-based detection with Emerging Threats Open ruleset plus custom rules for commercial spyware patterns. Multi-threaded PCAP processing with full protocol reassembly. Produces EVE JSON alerts with classification, severity, and flow metadata.

Zeek 8.0 Network Monitor

Protocol-level analysis producing structured connection logs, DNS logs, SSL logs, HTTP logs, and file extraction metadata. Custom Zeek scripts detect anomalous session patterns, unusual port usage, and covert channel indicators.

TLS/JA4 Fingerprinting

Extracts JA3, JA4, JA4H, and JARM fingerprints from every TLS handshake. Correlates against known fingerprint databases for malware families. Detects non-standard TLS stacks that deviate from expected browser/OS profiles.

DNS Threat Analysis

Frequency analysis and Shannon entropy scoring on queried domains. Detects DGA patterns, DNS tunneling (unusual TXT/CNAME record sizes), fast-flux networks, and resolution to known sinkhole infrastructure.

IP Reputation & GeoIP

Multi-feed threat intelligence correlation for destination IPs. ASN mapping and CIDR-level reputation scoring. MaxMind GeoIP2 for jurisdictional risk assessment. Flags connections to sanctioned regions and known hosting providers used by commercial spyware operators.

Behavioral & Covert Channel

Statistical profiling of traffic volume, timing, and upload/download ratios. Detects periodic beaconing (fixed interval ± jitter), asymmetric burst patterns consistent with exfiltration, and protocol abuse (ICMP tunneling, HTTP header channels, DNS covert channels).

Certificate Chain Validation

Full X.509 chain walk on every TLS connection. Detects: self-signed certs on standard ports, expired certificates, revoked certificates, wildcard abuse, and certificates issued by CAs not in the platform trust store. Cross-references Certificate Transparency logs where available.

Payload Entropy Analysis

Shannon entropy scoring on TCP/UDP payloads. High-entropy streams to non-standard ports indicate custom encryption channels outside normal TLS. Chunked stream analysis detects staged exfiltration that mimics normal traffic patterns.

Three Scan Modes

SmartScan supports three operational modes designed for different threat scenarios and operational contexts:

Manual Scan

Trigger: User-initiated via UI button.

Duration: 60–600 seconds (configurable).

Use case: On-demand forensic audit — verify device integrity before sensitive meetings, after traveling to high-risk jurisdictions, or as part of periodic security hygiene.

Operation: User taps "Start Scan" → WireGuard tunnel activates → server captures → engines analyze → report delivered to device.

Cold Boot Scan

Trigger: Automatic on BOOT_COMPLETED broadcast.

Duration: 300 seconds (configurable).

Use case: Continuous monitoring — captures traffic during the critical first minutes after boot when persistent implants re-establish C2 connections. Runs automatically without user interaction.

Operation: Device boots → BroadcastReceiver fires → WireGuard tunnel activated → scan runs in background → notification shows results.

Stealth Scan (Paranoid Mode)

Trigger: Armed by user → device powered off 24–48h → first boot.

Duration: 300 seconds (non-configurable).

Use case: Post-seizure verification — when a device has been confiscated, left unattended, or returned after physical access by an adversary. Designed to catch implants installed during the off period that beacon on first connectivity.

Threat model: Border crossing interception, hotel/TSCM scenarios, device return after law enforcement seizure, forensic laboratory analysis.

Stealth Scan — Technical Deep Dive

The Stealth Scan mode addresses the most sophisticated physical-access threat scenario. Its design accounts for Android platform restrictions introduced in API 31+ (Android 12):

Implementation Details

ComponentImplementationWhy
Arm persistenceSharedPreferences with stealth_armed=trueSurvives reboot; no database dependency
Boot receiverBOOT_COMPLETED BroadcastReceiverFires on every cold boot; checks stealth flag
Foreground launchsetFullScreenIntent() notificationAndroid 12+ blocks background startActivity(); full-screen intent is the compliant path
PIN lock handlingpending_stealth_ui SharedPreferences flagIf PIN lock screen appears before our Activity, we persist intent and navigate after unlock
Tunnel wait loop5-second polling with 60s timeoutWireGuard GoBackend takes variable time; scan must not start before tunnel is confirmed UP
Post-scan cleanupClear all stealth flags after report receivedPrevents re-trigger on next boot
Why 24–48 hours off? This window is calibrated to the operational pattern of physical-access implant deployment. Intelligence-grade spyware installers (whether government forensic tools or commercial products) require physical access time for exploitation. The 24–48h window ensures the device has been off long enough for a realistic attack scenario. Upon first boot, any newly installed implant will immediately attempt C2 communication — SmartScan captures this exact window.

Security Architecture

Transport Security

LayerProtocolCipherPurpose
Device ↔ ServerWireGuardChaCha20-Poly1305, Curve25519Full-tunnel capture pipe
API callsHTTPS/TLS 1.3AES-256-GCM, ECDHE P-256Scan control, report delivery
Certificate pinningSHA-256 pinPrevents MITM on API channel
AuthenticationOAuth 2.0 Device GrantRS256 JWTNo passwords on device
Storage at restAES-256-GCMPCAP and reports encrypted server-side

Data Handling

Validated Detection Capabilities

SmartScan has been validated against the following commercial spyware classes (IOC-specific details available under NDA at TLP:AMBER):

Threat ClassVendor/FamilyDetection SurfaceSmartScan Engines
HIGH Pegasus-class (zero-click) C2 beaconing over HTTPS, certificate anomalies, JA3 fingerprint divergence from OS default, high-entropy upload bursts Suricata, TLS/JA4, Behavioral, Entropy, Certificate
HIGH Predator-class (Intellexa) Multi-hop C2 via CDN overlay, DNS resolution anomalies, non-standard TLS stacks, geographic dispersion of C2 nodes DNS, TLS/JA4, GeoIP, IP Reputation, Protocol
HIGH Graphite-class (network injection) Anomalous connections during messaging-app flows, protocol-port mismatches, certificate chain inconsistencies, large data exfiltration sessions Protocol, Certificate, Behavioral, Covert Channel, Entropy
MODERATE Government forensic tools (UFED-class) Post-extraction callback beacons, telemetry upload patterns, atypical DNS query patterns after physical access DNS, Behavioral, IP Reputation
MODERATE Stalkerware / commercial RATs Persistent HTTP/HTTPS polling, unencrypted or weakly encrypted C2, known RAT protocol signatures Suricata, Protocol, TLS/JA4
IOC Classification: Specific indicators of compromise (IP addresses, domains, JA3 hashes, certificate fingerprints, user-agent strings) are classified TLP:AMBER and shared only under NDA with qualified partners and law enforcement agencies. Contact ac@securepath.biz (PGP encrypted) for access.

Deployment Architecture

Server Infrastructure

Client Integration

Compliance & Forensic Standards

Request SmartScan Access

SmartScan is available as an integrated feature of QuantorPhone or as a standalone SDK for qualified partners. For IOC briefings (TLP:AMBER), integration documentation, and commercial terms, contact our security team.

General enquiries: info@securepath.biz
Secure channel (PGP): ac@securepath.bizDownload PGP public key
Fingerprint: 85CE 91EA FF45 527B 5ABA A295 38DA 1D77 501B 1902
Company: Secure Path LTD — 41 Devonshire Street, London W1G 7AJ, United Kingdom