Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads

Posted on August 4, 2025August 4, 2025 By CWS

Cybersecurity researchers have found a nascent Android distant entry trojan (RAT) known as PlayPraetor that has contaminated greater than 11,000 gadgets, primarily throughout Portugal, Spain, France, Morocco, Peru, and Hong Kong.
“The botnet’s speedy progress, which now exceeds 2,000 new infections per week, is pushed by aggressive campaigns specializing in Spanish and French audio system, indicating a strategic shift away from its earlier frequent sufferer base,” Cleafy researchers Simone Mattia, Alessandro Strino, and Federico Valentini stated in an evaluation of the malware.
PlayPraetor, managed by a Chinese language command-and-control (C2) panel, does considerably deviate from different Android trojans in that it abuses accessibility companies to achieve distant management and may serve faux overlay login screens atop practically 200 banking apps and cryptocurrency wallets in an try to hijack sufferer accounts.
PlayPraetor was first documented by CTM360 in March 2025, detailing the operation’s use of 1000’s of fraudulent Google Play Retailer obtain pages to perpetrate an interconnected large-scale rip-off marketing campaign that may harvest banking credentials, monitor clipboard exercise, and log keystrokes.
“The hyperlinks to the impersonated Play Retailer pages are distributed by way of Meta Advertisements and SMS messages to successfully attain a large viewers,” the Bahrain-based firm famous on the time. “These misleading advertisements and messages trick customers to click on on the hyperlinks, main them to the fraudulent domains internet hosting the malicious APKs.”

Assessed to be a globally coordinated operation, PlayPraetor is available in 5 completely different variants that set up misleading Progressive Internet Apps (PWAs), WebView-based apps (Phish), exploit accessibility companies for persistent and C2 (Phantom), facilitate invite code-based phishing and trick customers into buying counterfeit merchandise (Veil), and grant full distant management by way of EagleSpy and SpyNote (RAT).

The Phantom variant of PlayPraetor, per the Italian fraud prevention firm, is able to on-device fraud (ODF) and is dominated by two principal affiliate operators who management about 60% of the botnet (roughly 4,500 compromised gadgets) and seem to heart their efforts round Portuguese-speaking targets.
“Its core performance depends on abusing Android’s accessibility companies to achieve in depth, real-time management over a compromised machine,” Cleafy stated. “This permits an operator to carry out fraudulent actions straight on the sufferer’s machine.”
Picture Supply: CTM360
As soon as put in, the malware beacons out to the C2 server by way of HTTP/HTTPS and makes use of a WebSocket connection to create a bidirectional channel to challenge instructions. It additionally units up a Actual-Time Messaging Protocol (RTMP) connection to provoke a video livestream of the contaminated machine’s display.
The evolving nature of the supported instructions signifies that PlayPraetor is being actively developed by its operators, permitting for complete information theft. In latest weeks, assaults distributing the malware have more and more focused Spanish- and Arabic-speaking victims, signaling a broader enlargement of the malware-as-a-service (MaaS) providing.
The C2 panel, for its half, is just not solely used to actively work together with compromised gadgets in real-time, but additionally allow the creation of bespoke malware supply pages that mimic Google Play Retailer on each desktop and cell gadgets.

“The marketing campaign’s success is constructed upon a well-established operational methodology, leveraging a multi-affiliate MaaS mannequin,” Cleafy stated. “This construction permits for broad and extremely focused campaigns.”
PlayPraetor is the most recent malware originating from Chinese language-speaking risk actors with an purpose to conduct monetary fraud, a development exemplified by the emergence of ToxicPanda and SuperCard X over the previous 12 months.
ToxicPanda Evolves
In line with information from Bitsight, ToxicPanda has compromised round 3,000 Android gadgets in Portugal, adopted by Spain, Greece, Morocco and Peru. Campaigns distributing the malware have leveraged TAG-1241, a site visitors distribution system (TDS), for malware distribution utilizing ClickFix and faux Google Chrome replace lures.

“This rigorously orchestrated redirection is a part of the TDS’s design to make sure that solely chosen targets are funneled to those malicious endpoints,” safety researcher Pedro Falé stated in a report final week.

The newest model of ToxicPanda improves upon its predecessors by incorporating a Area Technology Algorithm (DGA) to determine C2 and improve operational resilience within the face of infrastructure takedowns. Additionally baked into the malware are new instructions to set a fallback C2 area and higher management malicious overlays.
DoubleTrouble Rises
The findings come as Zimperium disclosed one other refined Android banking trojan dubbed DoubleTrouble that has advanced past overlay assaults to file the machine display, log keystrokes, and run numerous instructions for information exfiltration and entrenched machine management.
Apart from leaning closely on abusing Android’s accessibility companies to hold out its fraudulent actions, DoubleTrouble’s distribution technique entails leveraging bogus web sites that host malware samples straight inside Discord channels.

“The brand new functionalities embrace: displaying malicious UI overlays to steal PIN codes or unlock patterns, complete display recording capabilities, the power to dam the opening of particular purposes, and superior keylogging performance,” Zimperium zLabs researcher Vishnu Madhav stated.

The Hacker News Tags:Ads, Android, Devices, Fake, Google, Infects, Meta, Pages, Play, PlayPraetor, Trojan

Post navigation

Previous Post: APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging “mspaint.exe” File
Next Post: Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines

Related Posts

FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign The Hacker News
UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns The Hacker News
Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices The Hacker News
Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise The Hacker News
Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025 The Hacker News
North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity M&A Roundup: 44 Deals Announced in July 2025
  • Hackers Can Manipulate BitLocker Registry Keys Via WMI to Execute Malicious Code as Interactive User
  • Northwest Radiologists Data Breach Impacts 350,000 Washingtonians
  • The Wild West of Shadow IT
  • AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity M&A Roundup: 44 Deals Announced in July 2025
  • Hackers Can Manipulate BitLocker Registry Keys Via WMI to Execute Malicious Code as Interactive User
  • Northwest Radiologists Data Breach Impacts 350,000 Washingtonians
  • The Wild West of Shadow IT
  • AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News