Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware

Posted on August 25, 2025August 25, 2025 By CWS

A complicated Android malware marketing campaign has resurfaced, exploiting misleading web sites that completely mimic legit Google Play Retailer utility pages to distribute the infamous SpyNote Distant Entry Trojan (RAT).

This malicious operation targets unsuspecting customers by creating static HTML clones of standard Android utility set up pages, full with copied CSS styling and JavaScript performance designed to trick victims into downloading malicious APK information immediately from compromised servers.

The SpyNote malware represents a formidable risk within the cellular safety panorama, functioning as a extremely intrusive Android RAT with in depth surveillance capabilities.

As soon as put in, the malware can remotely management gadget cameras and microphones, handle cellphone calls, execute arbitrary instructions, and carry out refined keylogging operations that particularly goal utility credentials.

Pretend pages (Supply – Domaintools)

The primary concern is that it makes use of Android’s Accessibility Companies to steal two-factor codes and trick customers with pretend screens.

Domaintools researchers recognized this persistent marketing campaign as a continuation of earlier SpyNote exercise, noting important tactical evolution within the risk actor’s strategy.

The malicious infrastructure predominantly makes use of two IP addresses – 154.90.58[.]26 and 199.247.6[.]61 – with domains registered by way of NameSilo LLC and XinNet Expertise Company.

The pretend web sites persistently embrace particular JavaScript libraries and make use of nginx servers hosted on Lightnode Restricted and Vultr Holdings LLC infrastructure.

Superior An infection Mechanism and Payload Supply

The an infection course of begins when customers encounter convincing Google Play Retailer mimics that set off malicious downloads by way of a fastidiously crafted JavaScript perform.

Malware execution chain (Supply – Domaintools)

The core malicious performance depends on a obtain() perform that creates hidden iframes and units their supply to JavaScript URIs, successfully initiating APK downloads with out customers leaving the present web page.

The malware employs a classy multi-stage deployment course of using dynamic payload methods and DEX Component Injection.

The preliminary dropper APK (Chrome.apk with hash 48aa5f908fa612dcb38acf4005de72b9379f50c7e1bc43a4e64ce274bb7566) reads encrypted property, generates decryption keys from its AndroidManifest file, and decrypts the second-stage SpyNote payload.

The dropper extracts the bundle identify “rogcysibz.wbnyvkrn.sstjjs” to retrieve the 16-byte AES key “62646632363164386461323836333631” for payload decryption.

The malware demonstrates superior anti-analysis capabilities by way of management circulation obfuscation and identifier obfuscation, utilizing random variations of characters like ‘o’, ‘O’, and ‘0’ for all perform names.

This method considerably complicates static evaluation, whereas the dynamic loading mechanism ensures the first malicious features stay hid till runtime execution, successfully bypassing conventional safety detection strategies.

Increase your SOC and assist your workforce defend your enterprise with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Android, Beware, Deliver, Google, Malware, Mimicking, Pages, Play, Store, Website

Post navigation

Previous Post: Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes
Next Post: Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered

Related Posts

New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change Cyber Security News
10 Best Security Service Edge (SSE) Solutions Cyber Security News
PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files Cyber Security News
CISA Warns of Fortinet FortiWeb SQL Injection Vulnerability Exploited in Attacks Cyber Security News
Meta’s New Feature Transforms Instagram to a New Real-Time Location Broadcaster Cyber Security News
Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts
  • Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered
  • Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware
  • Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts
  • Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered
  • Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware
  • Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News