Monday, April 28, 2025
HomeAndroidNew ViceLeaker Malware Attack on Android Devices With Backdoor Capabilities to Hijack...

New ViceLeaker Malware Attack on Android Devices With Backdoor Capabilities to Hijack Camera, Record Audio

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered a new malware campaign called ViceLeaker that specifically targeting the Android users with sophisticated backdoor capabilities to Hijack camera, delete files, record audio and more.

Some of the Malware samples discovered by Kaspersky researchers are modified versions of an open source Jabber/XMPP client called “Conversations”  a legitimate version of the Android app available in Google Play.

Threat actors using Smali injection technique to backdoor legitimate applications and this technique more often used by attackers to disassemble the code of the original legitimate app with the help of Baksmali tool, Once they have added the malicious code then they assemble it with Smali.

- Advertisement - Google News

During the APK analysis phase, researchers uncovered that the malware employed some of the common spyware features and in additional, it capable of upload, download, delete files, take over the camera and record surrounding audio.

Modified Version of Conversations Samples

Newly discovered samples that are modified version of conversations app and the app sharing code with ViceLeaker malware with similar characters.

 According to Kaspersky research, The Conversations modified samples differ from the original one in the getKnownHosts method that was modified to replace the main XMPP host with the attackers’ C2 server.

There are many modifications was applied with the app and the attackers were using a specific C2 for the use of that app.

The malware uses HTTP for communication with the C2 server for command handling and data exfiltration.

In addition, attackers also changed the icon and package name that mimics Telegram messenger to adding the code and it might be one of the way attackers to hide their origin, researchers believe.

Even though, its a backdoor version of Conversations app, there wasn’t any malicious activities uncovered. but this modified version might be used by threat actors for their internal communication.

Attackers using “185.51.201[.]133” as a main C2 address for a backdoored version of Conversations app.

Researcher name this operation as “ViceLeaker”, because of strings and variables in its code.

“The operation of ViceLeaker is still ongoing, as is our research. The attackers have taken down their communication channels and are probably looking for ways to assemble their tools in a different manner, Kaspersky said.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read

Chinese APT 10 Group Hacked Nearly 10 Telecom Networks and Stealing Users Call Records, PII, Credentials, Email Data and more

Hackers Take Complete Control of Your Android Device by Launching MobOk Malware via Fake Photo Editing Apps in Google Play

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

CISA Alerts Users to Security Flaws in Planet Technology Network Products

The United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security...

New iOS Vulnerability Could Brick iPhones with Just One Line of Code

A security researcher has uncovered a critical vulnerability in iOS, Apple's flagship mobile operating...

Cybercriminals Selling Sophisticated HiddenMiner Malware on Dark Web Forums

Cybercriminals have begun openly marketing a powerful new variant of the HiddenMiner malware on...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

CISA Alerts Users to Security Flaws in Planet Technology Network Products

The United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security...

New iOS Vulnerability Could Brick iPhones with Just One Line of Code

A security researcher has uncovered a critical vulnerability in iOS, Apple's flagship mobile operating...