• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
rogue android apps target pakistani individuals in sophisticated espionage campaign

Rogue Android Apps Target Pakistani Individuals in Sophisticated Espionage Campaign

You are here: Home / General Cyber Security News / Rogue Android Apps Target Pakistani Individuals in Sophisticated Espionage Campaign
June 20, 2023

Folks in the Pakistan region have been qualified using two rogue Android apps obtainable on the Google Participate in Retailer as element of a new targeted campaign.

Cybersecurity firm Cyfirma attributed the marketing campaign with average confidence to a threat actor recognised as DoNot Group, which is also tracked as APT-C-35 and Viceroy Tiger.

The espionage exercise consists of duping Android smartphone homeowners into downloading a system that’s used to extract call and site info from unwitting victims.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“The motive at the rear of the attack is to get info by means of the stager payload and use the collected information and facts for the next-phase attack, using malware with much more destructive capabilities,” the firm mentioned.

DoNot Staff is a suspected India-nexus risk actor that has a status for carrying out attacks in opposition to different international locations in South Asia. It has been active considering that at least 2016.

Although an Oct 2021 report from Amnesty Worldwide linked the group’s attack infrastructure to an Indian cybersecurity business termed Innefu Labs, Group-IB, in February 2023, reported it recognized overlaps involving DoNot Group and SideWinder, a different suspected Indian hacking crew.

Cybersecurity

Attack chains mounted by the group leverage spear-phishing emails that contains decoy files and documents as lures to distribute malware. In addition, the threat actor is regarded to use malicious Android apps that masquerade as legit utilities in their target attacks.

These apps, when set up, activate trojan behavior in the track record and can remotely handle the victim’s process, apart from pilfering private information and facts from the contaminated devices.

Rogue Android Apps

The newest set of purposes found by Cyfirma originate from a developer named “SecurITY Business” and pass off as VPN and chat applications, with the latter nonetheless accessible for download from the Enjoy Retail outlet –

  • iKHfaa VPN (com.securityapps.ikhfaavpn) – 10+ downloads
  • nSure Chat (com.nSureChat.application) – 100+ downloads

The VPN application, which reuses resource code taken from the genuine Liberty VPN solution, is no lengthier hosted on the official application storefront, while proof shows that it was offered as not too long ago as June 12, 2023.

The lower download counts is an indicator that the apps are staying utilised as part of a hugely targeted operation, a hallmark of nation-point out actors. Both applications are configured to trick the victims into granting them invasive permissions to obtain their make contact with lists and precise destinations.

Minor is recognized about the victims targeted using the rogue applications barring the simple fact that they are primarily based in Pakistan. It can be thought that consumers may perhaps have been approached by way of messages on Telegram and WhatsApp to lure them into putting in the applications.

By utilizing the Google Perform Retailer as a malware distribution vector, the solution abuses the implicit believe in positioned by people on the on the net application marketplace and lends it an air of legitimacy. It’s, therefore, critical that apps are thoroughly scrutinized prior to downloading them.

“It seems that this Android malware was exclusively designed for data collecting,” Cyfirma explained. “By gaining access to victims’ speak to lists and locations, the risk actor can strategize potential attacks and use Android malware with superior options to concentrate on and exploit the victims.”

Identified this write-up exciting? Adhere to us on Twitter  and LinkedIn to study more special articles we put up.


Some sections of this post are sourced from:
thehackernews.com

Previous Post: «new mystic stealer malware targets 40 web browsers and 70 New Mystic Stealer Malware Targets 40 Web Browsers and 70 Browser Extensions
Next Post: Over 100,000 Stolen ChatGPT Account Credentials Sold on Dark Web Marketplaces over 100,000 stolen chatgpt account credentials sold on dark web»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.