• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
patchwork using romance scam lures to infect android devices with

Patchwork Using Romance Scam Lures to Infect Android Devices with VajraSpy Malware

You are here: Home / General Cyber Security News / Patchwork Using Romance Scam Lures to Infect Android Devices with VajraSpy Malware
February 5, 2024

The risk actor regarded as Patchwork probably utilized romance scam lures to lure victims in Pakistan and India, and infect their Android units with a remote access trojan known as VajraSpy.

Slovak cybersecurity company ESET reported it uncovered 12 espionage apps, six of which were available for obtain from the formal Google Perform Store and were being collectively downloaded additional than 1,400 occasions between April 2021 and March 2023.

“VajraSpy has a assortment of espionage functionalities that can be expanded centered on the permissions granted to the app bundled with its code,” security researcher Lukáš Štefanko mentioned. “It steals contacts, data files, get in touch with logs, and SMS messages, but some of its implementations can even extract WhatsApp and Sign messages, record phone calls, and get images with the digicam.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


As a lot of as 148 products in Pakistan and India are believed to have been compromised in the wild. The destructive apps distributed through Google Enjoy and somewhere else primarily masqueraded as messaging applications, with the most modern kinds propagated as not too long ago as September 2023.

  • Privee Talk (com.priv.discuss)
  • MeetMe (com.meeete.org)
  • Let’s Chat (com.letsm.chat)
  • Brief Chat (com.qqc.chat)
  • Rafaqat رفاق (com.rafaqat.news)
  • Chit Chat (com.chit.chat)
  • YohooTalk (com.yoho.communicate)
  • TikTalk (com.tik.converse)
  • Hello there Chat (com.hi there.chat)
  • Nidus (com.nidus.no or com.nionio.org)
  • GlowChat (com.glow.glow)
  • Wave Chat (com.wave.chat)

Rafaqat رفاق is noteworthy for the reality that it’s the only non-messaging app and was marketed as a way to access the hottest information. It was uploaded to Google Participate in on October 26, 2022, by a developer named Mohammad Rizwan and amassed a full of 1,000 downloads right before it was taken down by Google.

Cybersecurity

The precise distribution vector for the malware is at present not very clear, despite the fact that the character of the apps indicates that the targets were tricked into downloading them as element of a honey-trap romance scam, exactly where the perpetrators convince them to install these bogus apps under the pretext of obtaining a additional secure discussion.

This is not the initially time Patchwork – a risk actor with suspected ties to India – has leveraged this procedure. In March 2023, Meta disclosed that the hacking crew designed fictitious personas on Fb and Instagram to share back links to rogue apps to goal victims in Pakistan, India, Bangladesh, Sri Lanka, Tibet, and China.

It can be also not the first time that the attackers have been noticed deploying VajraRAT, which was earlier documented by Chinese cybersecurity firm QiAnXin in early 2022 as possessing been made use of in a marketing campaign aimed at Pakistani govt and armed forces entities. Vajra gets its name from the Sanskrit word for thunderbolt.

VajraSpy Malware

Qihoo 360, in its very own analysis of the malware in November 2023, tied it to a danger actor it tracks beneath the moniker Hearth Demon Snake (aka APT-C-52).

Outside of Pakistan and India, Nepalese federal government entities have also been likely qualified through a phishing marketing campaign that delivers a Nim-centered backdoor. It has been attributed to the SideWinder team, another group that has been flagged as operating with Indian passions in brain.

The progress arrives as monetarily motivated risk actors from Pakistan and India have been observed focusing on Indian Android buyers with a phony mortgage app (Moneyfine or “com.moneyfine.good”) as portion of an extortion rip-off that manipulates the selfie uploaded as element of a know your client (KYC) course of action to produce a nude image and threatens victims to make a payment or risk receiving the doctored photos distributed to their contacts.

“These unknown, financially motivated threat actors make attractive guarantees of speedy financial loans with minimal formalities, provide malware to compromise their products, and hire threats to extort dollars,” Cyfirma explained in an investigation late very last thirty day period.

Cybersecurity

It also comes amid a broader development of individuals slipping prey to predatory mortgage applications, which are recognised to harvest delicate data from infected equipment, and employ blackmail and harassment methods to tension victims into generating the payments.

According to a current report revealed by the Network Contagion Analysis Institute (NCRI), adolescents from Australia, Canada, and the U.S. are significantly qualified by economical sextortion attacks executed by Nigeria-dependent cybercriminal team recognised as Yahoo Boys.

“Almost all of this exercise is connected to West African cybercriminals identified as the Yahoo Boys, who are generally targeting English-talking minors and younger adults on Instagram, Snapchat, and Wizz,” NCRI mentioned.

Wizz, which has since experienced its Android and iOS applications taken down from the Apple App Retail outlet and the Google Perform Retailer, countered the NCRI report, stating it truly is “not conscious of any productive extortion attempts that occurred even though speaking on the Wizz application.”

Located this short article attention-grabbing? Stick to us on Twitter  and LinkedIn to read a lot more distinctive articles we put up.


Some pieces of this posting are sourced from:
thehackernews.com

Previous Post: «hands on review: sase based xdr from cato networks Hands-On Review: SASE-based XDR from Cato Networks
Next Post: Belarusian National Linked to BTC-e Faces 25 Years for $4 Billion Crypto Money Laundering belarusian national linked to btc e faces 25 years for $4»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.