Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks

Posted on July 29, 2025July 29, 2025 By CWS

Cybersecurity researchers have found a brand new, large-scale cellular malware marketing campaign that is focusing on Android and iOS platforms with pretend courting, social networking, cloud storage, and automotive service apps to steal delicate private information.
The cross-platform risk has been codenamed SarangTrap by Zimperium zLabs. Customers in South Korea seem like the first focus.
“This intensive marketing campaign concerned over 250 malicious Android functions and greater than 80 malicious domains, all disguised as reputable courting and social media functions,” safety researcher Rajat Goyal stated.
The bogus domains, which impersonate reputable app retailer itemizing pages, are used as a lure to trick customers into putting in these apps, ensuing within the exfiltration of contact lists and pictures, all whereas maintaining an phantasm of legitimacy.
As soon as put in, the Android apps additionally immediate the sufferer to enter an invite code, after which it is validated in opposition to a command-and-control (C2) server. The app then proceeds to request delicate permissions that enable it entry to SMS messages, contact lists, and recordsdata underneath the pretext of providing the marketed performance.
Coupling the activation of the malicious conduct to an invite code is, by turns, intelligent and sneaky because it permits the malware to evade dynamic analyses and antivirus scans and silently hoover information.
The iOS model of the marketing campaign has been discovered to entice customers into putting in a misleading cellular configuration profile on their system, after which use the configuration to facilitate the app set up to seize contacts, pictures, and the photograph library.
The marketing campaign is alleged to be in energetic growth, with new variants of the malware samples limiting themselves to accumulating contacts, photographs, and system data to an exterior server. There’s additionally proof that the risk actors behind the exercise have resorted to blackmailing victims with threats to share private movies with members of the family.

“This unsettling story isn’t an remoted incident; it highlights the psychological manipulation and social engineering techniques that these campaigns make use of to benefit from emotional vulnerability,” Goyal stated.
“Victims are enticed into putting in malware with the promise of companionship, solely to find that they’re caught in a cycle of surveillance, extortion, and humiliation.”
The disclosure comes within the wake of one other marketing campaign that has arrange 607 Chinese language-language domains to distribute malicious utility recordsdata (APKs) posing because the Telegram messaging app through a QR code embedded on the location and execute distant instructions in real-time to allow information theft, surveillance, and management over the system utilizing the MediaPlayer API.

“The APK was signed with a v1 signature scheme, making it weak to the Janus vulnerability on Android 5.0 – 8.0,” BforeAI stated. “This vulnerability permits attackers to craft misleading functions.”
“After crafting the malicious utility, it’s then repackaged utilizing its unique v1 signature. This modification goes undetected, permitting the compromised app to be put in with out inflicting suspicion. In essence, it allows attackers to make an app extra harmful, redistribute it as an APK, and trick customers (particularly on older units) into putting in it whereas utterly bypassing safety checks.”

Mimicking trusted and fashionable on-line platforms has been a profitable compromise vector, as evidenced by Android campaigns which can be focusing on Indian financial institution clients and Bengali-speaking customers, significantly folks from Bangladesh dwelling in Saudi Arabia, Malaysia, and the United Arab Emirates, with malicious apps posing as monetary providers distributed through phishing websites and Fb pages.
The functions are designed to deceive customers into coming into their private data as a part of a supposed account creation course of, in addition to seize information offered by them within the pretend transaction interfaces engineered to simulate cellular cash transfers, invoice funds, and financial institution transfers. In actuality, no precise transaction is carried out.
“Whereas the assault methods usually are not new, the marketing campaign’s cultural focusing on and sustained exercise replicate how cybercriminals proceed to adapt their methods to succeed in particular communities,” McAfee Labs researcher Dexter Shin stated.

The malware disseminated by impersonating Indian banking providers, for its half, leverages Firebase for C2 operations and makes use of phishing pages to imitate real consumer interfaces and harvest a variety of knowledge, together with debit card particulars and SIM data. It additionally options name forwarding and distant calling capabilities.
One other Asian nation that has turn into the goal of Android malware assaults is Vietnam, the place phishing websites posing as monetary and authorities establishments are getting used to propagate a brand new banking trojan dubbed RedHook.

“It communicates to the command-and-control (C2) server utilizing WebSocket and helps over 30 distant instructions, enabling full management over compromised units,” Cyble stated. “Code artifacts, together with Chinese language-language strings, counsel growth by a Chinese language-speaking risk actor or group.”
A notable function of the RedHook is its mixture of keylogging and distant entry trojan (RAT) capabilities to conduct credential theft and monetary fraud. It additionally abuses Android’s accessibility providers to carry out overlay assaults and leverages the MediaProjection API to seize display content material.
Though the marketing campaign is new, an uncovered AWS S3 bucket utilized by the risk actor has uncovered uploaded screenshots, pretend banking templates, PDF paperwork, and pictures detailing the malware’s conduct courting again to November 27, 2024.
“The invention of RedHook highlights the rising sophistication of Android banking trojans that mix phishing, distant entry, and keylogging to hold out monetary fraud,” the corporate added. “By leveraging reputable Android APIs and abusing accessibility permissions, RedHook stealthily features deep management over contaminated units whereas remaining underneath the radar of many safety options.”
Malicious Android APKs masquerading as fashionable manufacturers and exploiting social engineering and off-market distribution channels have additionally been discovered to siphon information and hijack community visitors for monetization functions, usually with the tip objective of simulating consumer exercise to inflate advert metrics or redirect customers via affiliate funnels for illicit income technology.
Apart from incorporating checks for sandboxed and virtualized environments, the apps function a modular design to activate superior performance at will.
“It leverages the open-source instrument ApkSignatureKillerEx to subvert Android’s native signature verification course of, permitting the injection of a secondary payload (origin.apk) into the applying’s listing,” Trustwave SpiderLabs stated. “This successfully reroutes execution to malicious code whereas preserving the app’s look as a reputable, correctly signed package deal, each to the working system and customers.”
The marketing campaign has not been attributed to any identified risk actor or group, though the usage of advert fraud techniques suggests a doable connection to Chinese language-speaking legal teams.

That is not all. New analysis from iVerify has revealed that organising new Android-focused campaigns could be as simple as renting a malware-as-a-service (MaaS) equipment like PhantomOS or Nebula for a month-to-month subscription, additional decreasing the bar for cybercrime.
“A few of these kits include options 2FA interception, the power to bypass antivirus software program, silent app installs, GPS monitoring, and even phishing overlays which can be particular to a model,” researcher Daniel Kelley stated. “The platforms include all the pieces they want, like help via Telegram, backend infrastructure, and built-in methods to get round Google Play Shield.”
Additionally supplied on underground boards are crypters and exploit kits that enable the malware to remain underneath the radar and unfold the infections at scale utilizing social engineering methods. One such instrument is Android ADB Scanner, which appears to be like for open Android Debug Bridge (ADB) ports and pushes a malicious APK file with out the sufferer’s information. The service is on the market for round $600-$750.
“Maybe probably the most attention-grabbing growth on this ecosystem is the commoditization of contaminated units themselves,” Kelley famous. “So-called ‘set up’ markets let cybercriminals purchase entry to already compromised Android units in bulk.”
Markets similar to Valhalla provide units compromised by banking trojans like ERMAC, Hook, Hydra, and Octo in a selected nation for a price. This method obviates the necessity for attackers to distribute malware or infect units on their very own. As a substitute, they will simply purchase a community of current bots to hold out actions of their selection.
To mitigate the dangers posed by such apps, it is suggested to stay cautious of apps requiring uncommon permissions or invitation codes, keep away from downloading apps from untrusted sources or unofficial app shops, and periodically overview system permissions and put in profiles.

The Hacker News Tags:Apps, Asias, Blackmail, Cybercriminals, Data, Fake, Mobile, Networks, Steal, Users

Post navigation

Previous Post: From Ex Machina to Exfiltration: When AI Gets Too Curious
Next Post: Dropzone AI Raises $37 Million for Autonomous SOC Analyst

Related Posts

Security Tools Alone Don’t Protect You — Control Effectiveness Does The Hacker News
Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack The Hacker News
Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers The Hacker News
Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks The Hacker News
Meta Adds Passkey Login Support to Facebook for Android and iOS Users The Hacker News
5 BCDR Essentials for Effective Ransomware Defense The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes
  • Gunra Ransomware New Linux Variant Runs Up To 100 Encryption Threads With New Partial Encryption Feature
  • Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install
  • Qilin Ransomware Leverages TPwSav.sys Driver to Disable EDR Security Measures
  • New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes
  • Gunra Ransomware New Linux Variant Runs Up To 100 Encryption Threads With New Partial Encryption Feature
  • Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install
  • Qilin Ransomware Leverages TPwSav.sys Driver to Disable EDR Security Measures
  • New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News