Thursday, May 15, 2025
HomeMalwareCyberespionage campaign Spreading AnubisSpy to Spying Skype, WhatsApp, Facebook, and Twitter

Cyberespionage campaign Spreading AnubisSpy to Spying Skype, WhatsApp, Facebook, and Twitter

Published on

SIEM as a Service

Follow Us on Google News

Newly emerging malware that combined with several malicious apps called AnubisSpy linked to cyberespionage campaign to steal messages (SMS), photos, videos, contacts, email accounts, calendar events, and browser histories.

its sophisticated capabilities also performing to take screenshots and record audio, including calls which basically targets Middle Eastern countries.

This kind of spyware app Developers creating a website for promoting the spyware via social media to reach more number of peoples and trick them to install this Malicious spyware app.

- Advertisement - Google News

Anubispy discovered as an (ANDROIDOS_ANUBISSPY) and all related malware payload consist of a package called watchdog.

Also Read: New “GnatSpy” Mobile virus Stealing data Such as Images, Text messages, Contacts, and Call History

How does AnubisSpy Malware Works

It can spy the victims mobile by installed apps on the victim’s device and it can spy even Skype, WhatsApp, Facebook, and Twitter, among others.

Once it collected the relevant data, it will encrypt the stolen information and send it across to attackers via command and control server.

AnubisSpy is capable of self-distractive to cover its tracks and it also used the command to delete the file on the device as well as install and uninstall Android Application Packages (APKs).

Structure of AnubisSpy’s modules

Well constructed AnubisSpy has several modules that separately having individual roles to perform many activities that have explained in above image.

cyberespionage campaign Sphinx related with AnubisSpy Malware using watering hole technique via social media sites to deliver its payloads.

It using some dupe recipients to  the legitimate application for clicking them and execute the payload. according to timestamp Sphinx activily evolving since 2011.

According to Trend Micro simple WHOIS query of AnubisSpy’s C&C server showed it abused a legitimate managed to host service provider and it using following steps to targeting victims to spreading this payload.

  • Shared C&C server, 86[.]105[.]18[.]107
  • Shared technique of decrypting JSON files, and similarity between the file structures of AnubisSpy and Sphinx’s malware
  • Similar targets (highly concentrated in Middle Eastern countries)

These were signed with the same fake Google certificates. We found two more apps created by the same developer, but they had no espionage-related codes. Trend Micro said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

Katz Stealer Malware Hits 78+ Chromium and Gecko-Based Browsers

Newly disclosed information-stealing malware dubbed Katz Stealer has emerged as a significant threat to...

Hackers Weaponize KeePass Password Manager to Spread Malware and Steal Passwords

Threat actors have successfully exploited the widely-used open-source password manager, KeePass, to spread malware...