• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
patchwork using romance scam lures to infect android devices with

Patchwork Using Romance Scam Lures to Infect Android Devices with VajraSpy Malware

You are here: Home / General Cyber Security News / Patchwork Using Romance Scam Lures to Infect Android Devices with VajraSpy Malware
February 5, 2024

The risk actor regarded as Patchwork probably utilized romance scam lures to lure victims in Pakistan and India, and infect their Android units with a remote access trojan known as VajraSpy.

Slovak cybersecurity company ESET reported it uncovered 12 espionage apps, six of which were available for obtain from the formal Google Perform Store and were being collectively downloaded additional than 1,400 occasions between April 2021 and March 2023.

“VajraSpy has a assortment of espionage functionalities that can be expanded centered on the permissions granted to the app bundled with its code,” security researcher Lukáš Štefanko mentioned. “It steals contacts, data files, get in touch with logs, and SMS messages, but some of its implementations can even extract WhatsApp and Sign messages, record phone calls, and get images with the digicam.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


As a lot of as 148 products in Pakistan and India are believed to have been compromised in the wild. The destructive apps distributed through Google Enjoy and somewhere else primarily masqueraded as messaging applications, with the most modern kinds propagated as not too long ago as September 2023.

  • Privee Talk (com.priv.discuss)
  • MeetMe (com.meeete.org)
  • Let’s Chat (com.letsm.chat)
  • Brief Chat (com.qqc.chat)
  • Rafaqat رفاق (com.rafaqat.news)
  • Chit Chat (com.chit.chat)
  • YohooTalk (com.yoho.communicate)
  • TikTalk (com.tik.converse)
  • Hello there Chat (com.hi there.chat)
  • Nidus (com.nidus.no or com.nionio.org)
  • GlowChat (com.glow.glow)
  • Wave Chat (com.wave.chat)

Rafaqat رفاق is noteworthy for the reality that it’s the only non-messaging app and was marketed as a way to access the hottest information. It was uploaded to Google Participate in on October 26, 2022, by a developer named Mohammad Rizwan and amassed a full of 1,000 downloads right before it was taken down by Google.

Cybersecurity

The precise distribution vector for the malware is at present not very clear, despite the fact that the character of the apps indicates that the targets were tricked into downloading them as element of a honey-trap romance scam, exactly where the perpetrators convince them to install these bogus apps under the pretext of obtaining a additional secure discussion.

This is not the initially time Patchwork – a risk actor with suspected ties to India – has leveraged this procedure. In March 2023, Meta disclosed that the hacking crew designed fictitious personas on Fb and Instagram to share back links to rogue apps to goal victims in Pakistan, India, Bangladesh, Sri Lanka, Tibet, and China.

It can be also not the first time that the attackers have been noticed deploying VajraRAT, which was earlier documented by Chinese cybersecurity firm QiAnXin in early 2022 as possessing been made use of in a marketing campaign aimed at Pakistani govt and armed forces entities. Vajra gets its name from the Sanskrit word for thunderbolt.

VajraSpy Malware

Qihoo 360, in its very own analysis of the malware in November 2023, tied it to a danger actor it tracks beneath the moniker Hearth Demon Snake (aka APT-C-52).

Outside of Pakistan and India, Nepalese federal government entities have also been likely qualified through a phishing marketing campaign that delivers a Nim-centered backdoor. It has been attributed to the SideWinder team, another group that has been flagged as operating with Indian passions in brain.

The progress arrives as monetarily motivated risk actors from Pakistan and India have been observed focusing on Indian Android buyers with a phony mortgage app (Moneyfine or “com.moneyfine.good”) as portion of an extortion rip-off that manipulates the selfie uploaded as element of a know your client (KYC) course of action to produce a nude image and threatens victims to make a payment or risk receiving the doctored photos distributed to their contacts.

“These unknown, financially motivated threat actors make attractive guarantees of speedy financial loans with minimal formalities, provide malware to compromise their products, and hire threats to extort dollars,” Cyfirma explained in an investigation late very last thirty day period.

Cybersecurity

It also comes amid a broader development of individuals slipping prey to predatory mortgage applications, which are recognised to harvest delicate data from infected equipment, and employ blackmail and harassment methods to tension victims into generating the payments.

According to a current report revealed by the Network Contagion Analysis Institute (NCRI), adolescents from Australia, Canada, and the U.S. are significantly qualified by economical sextortion attacks executed by Nigeria-dependent cybercriminal team recognised as Yahoo Boys.

“Almost all of this exercise is connected to West African cybercriminals identified as the Yahoo Boys, who are generally targeting English-talking minors and younger adults on Instagram, Snapchat, and Wizz,” NCRI mentioned.

Wizz, which has since experienced its Android and iOS applications taken down from the Apple App Retail outlet and the Google Perform Retailer, countered the NCRI report, stating it truly is “not conscious of any productive extortion attempts that occurred even though speaking on the Wizz application.”

Located this short article attention-grabbing? Stick to us on Twitter  and LinkedIn to read a lot more distinctive articles we put up.


Some pieces of this posting are sourced from:
thehackernews.com

Previous Post: «hands on review: sase based xdr from cato networks Hands-On Review: SASE-based XDR from Cato Networks
Next Post: Belarusian National Linked to BTC-e Faces 25 Years for $4 Billion Crypto Money Laundering belarusian national linked to btc e faces 25 years for $4»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.