Thursday, April 3, 2025
HomeAndroidOpen-Source Spyware Spreading Via Google Play Store App to Send SMS, Steal...

Open-Source Spyware Spreading Via Google Play Store App to Send SMS, Steal Contacts, Files & Credentials

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered an open-source spyware AhMyth associated with Google play store app called RB Music to intrude the Android users device to steal various sensitive information.

RB Music also know as Radio Balouch, a malicious streaming radio based Android app appeared in Google play store borrowed malicious features and functionality from AhMyth to infect the Android users in wide.

AhMyth
Radio Balouch Appeared in PlayStore (Souce: ESET)

AhMyth, an open-source espionage tool developed to infect with the Android devices with the help of Android apps that implant to the targeted devices and opens a backdoor to spy the victim activities and steal the data.

A desktop application based on electron framework act as a command and control server operating by the attackers to send further commands and obtain the information.

There are several apps were used this AhMyth spyware since 2017, But Radio Balouch is a first app that officially appeared in Google play store.

AhMyth advertising selling in Chinese- and English-speaking underground forum that focuses more on Android devices.

Lukas Stefanko, ESET researcher said through a blog post, “besides Google Play, the malware, detected by ESET as Android/Spy.Agent.AOX has been available on alternative app stores. Additionally, it has been promoted on a dedicated website, via Instagram, and YouTube.”

Radio Balouch streaming radio app initially appeared on July 2nd, 2019 and eventually, the app has been removed from the App Store with the 24 hours. but still, maintain its existence in the 3rd party app store.

Spyware Infection Process

Attacker integrates the radio functionality with the functionality of AhMyth and, implemented with the Radio Balouch app which appears with full functionality including playing a stream of Balouchi music.

In the background, AhMyth’s malicious functionality has enabled and collecting the various devices information, steal the steal contacts, harvest files stored on the device and, send SMS messages.

There are several variants are discovered based on the AhMyth but those variants functionalities are different.

Once the app will be launched, users required to choose the desired languages, soon after the app will start requesting permissions.

Radio Balouch first request the permission for accessing the device files which is the default request for every music app and if its declined then the app will not be work. Next, the app will request permission to access the contact.

Acccording to ESET, After the setup, the app opens its home screen with music options, and offers the option to register and login. However, any “registering” is meaningless as any input will bring the user into the “logined” state, in the operators’ poor English. Probably, this step has been added to lure credentials from the victims and try to break into other services using the obtained passwords – a reminder to never reuse passwords across services. 

Later the app will establish the Command and Control server to transmit the stolen credentials, victims’ contacts lists and other details via unencrypted HTTP connection.

AhMyth
C2 server Communication (Source: ESET)

“The (repeated) appearance of the Radio Balouch malware on the Google Play store should serve as a wake-up call to both the Google security team and Android users. still, there is a lot more possibility for a new clone of Radio Balouch or any other derivative of AhMyth may appear on Google Play.” ESET said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking News updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces...

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Operation HollowQuill Uses Malicious PDFs to Target Academic and Government Networks

A newly uncovered cyber-espionage campaign, dubbed Operation HollowQuill, has been identified as targeting academic,...

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware...

Hackers Selling SnowDog RAT Malware With Remote Control Capabilities Online

A sophisticated remote access trojan (RAT) dubbed SnowDog has surfaced on underground cybercrime forums, prompting alarms...