Monday, April 28, 2025
HomeAndroidHackers Imitate Google Chrome Install Page on Google Play to Distribute Android...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the Google Play Store to distribute Android malware.

These websites, hosted on newly registered domains, create a façade of credible application installation pages, enticing victims with downloads that appear legitimate, including apps like Google Chrome.

The sites are engineered with features designed to mislead, such as an image carousel that showcases high-fidelity screenshots of what appears to be authentic Google Play Store app pages.

- Advertisement - Google News

These images are sourced from another suspicious domain, enhancing the visual impact and credibility of the deception.

Malware Delivery Mechanics

Upon clicking on any image within this carousel, a JavaScript function labeled “download()” is executed, initiating the download of what appears to be a legitimate .apk file.

Android Malware
dropper installs a second .apk file

However, these are droppers for the SpyNote and SpyMax Android Remote Access Trojans (RATs), known for their robust surveillance capabilities and data exfiltration.

Here’s how the malware is delivered:

  • Dropper APK: The dropper, when executed, installs a secondary APK embedded within it. This secondary APK contains the primary functionalities of SpyNote, including data theft, call manipulation, and remote control over the device’s camera and microphone.
  • Command and Control (C2) Connection: Within the secondary APK, a base.dex file in the assets folder holds the connection parameters essential for establishing communication with C2 servers. Notably, some variations use hardcoded IP addresses for C2 connectivity.

Extensive Capabilities and Implications of SpyNote

The SpyNote RAT is not just a simple piece of malware but a sophisticated tool for surveillance and remote control:

  • Data Theft: It aggressively seeks permissions upon installation, enabling access to SMS messages, contacts, call logs, location information, and more. Files are also at risk, including sensitive personal documents and photos.
  • Surveillance: SpyNote activates device cameras and microphones without the user’s knowledge, capturing video and audio for transmission to the attackers.
  • Remote Control: Attackers can manipulate calls, install further applications, remotely wipe data, or lock the device. This extensive control makes SpyNote a prime tool for espionage and cybercrime.

The campaign utilizes a mixture of English and Chinese-language delivery sites, with Chinese comments noted within both the delivery site code and the malware itself.

Android Malware
Chinese-language comments

While definitive attribution is absent, a China nexus is suspected, suggesting the involvement of cyber actors leveraging linguistic and cultural similarities for targeted attacks.

SpyNote’s history includes its use by sophisticated APT groups such as OilRig (APT34), APT-C-37 (Pat-Bear), and OilAlpha, targeting high-profile entities like Indian Defense Personnel.

The malware builder tool’s availability on underground forums has further democratized its use among a broad spectrum of cybercriminals.

According to the Report, this campaign highlights the evolving nature of digital threats where even verified platforms like Google Play are emulated to deceive users.

Cybersecurity measures must adapt:

  • Download with Caution: Users should only download applications from verified sources, scrutinizing app permissions and ratings before installation.
  • System Updates: Keeping devices updated with the latest security patches is crucial to mitigate vulnerabilities that could be exploited by such malware.
  • Education: Awareness and education about social engineering tactics employed in these campaigns are vital for individual and organizational cybersecurity hygiene.

The deceptive campaign to distribute SpyNote via fake Google Play Store pages underscores the need for vigilance, robust cybersecurity practices, and ongoing education to protect against such sophisticated cyber threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...