Governments are increasingly using spyware for mobile devices to monitor targets, raising questions over the possible misuse of such tools, a new study suggests.

The Citizen Lab, part of the Munk School of Global Affairs at the University of Toronto, and Kaspersky Lab both published analyses on Tuesday of a surveillance product called Remote Control System (RCS) from Hacking Team in Italy.

Hacking Team is one of a handful of companies, including the Gamma Group, specializing in what are essentially malicious software programs designed to intercept data but intended for governments and law enforcement.

The Citizen Lab has long expressed concern in other published research over the use of the tools by governments, which it has concluded have been employed to suppress speech and monitor political opponents in the past.

Over time, the cost of the spying toolkits has fallen and they are now within reach of nearly all governments, the Citizen Lab said in its writeup.

“By dramatically lowering the entry cost on invasive and hard-to-trace monitoring, the equipment lowers the cost of targeting political threats for those with access to Hacking Team and Gamma Group toolkits,” the group wrote.

The latest research looks into the exploitation techniques for an Android component of RCS and the command-and-control infrastructure behind it.

The Citizen Lab identified a suspicious Android APK (application installation package) that was a functional copy of the news application “Qatif Today” intended for people in Saudi Arabia. A version of it had been modified to also deliver a payload created by Hacking Team.

A link to what appeared to the malicious APK was tweeted, which led to a Dropbox file that is now gone, The Citizen Lab wrote. If installed, the Hacking Team module requests permissions such as reading and writing SMSes, monitoring GPS location and the ability to process calls.

The Citizen Lab found other Android Hacking Team Android implants that tried to access local stores of chats in applications such as Facebook, Viber, Skype, Line and QQ.

A source leaked to The Citizen Lab a group of documents that describes how the RCS works, giving the research group broad insight into how tracking targets works. The group cautioned the documents have not been verified, but the information did not contradict its own RCS research.

Kaspersky Lab wrote on its blog that it uncovered “a huge infrastructure that is used to control the RCS malware implants.”

Kaspersky scanned the entire IPV4 Internet address space, using a special “fingerprinting” method it developed that can identify RCS command-and-control servers.

It found 64 RCS command-and-control servers in the U.S., the most of any country, followed by 49 in Kazakhstan, 35 in Ecuador and 24 in the U.K. Other countries with double-digit numbers of control servers included Canada, China and Colombia.

Some of the IP addresses connected with those servers appeared to be government owned, Kaspersky said. It’s unlikely law enforcement agencies would locate those command servers in other countries “in order to avoid cross-border legal problems and the seizure of servers,” the company wrote.