Monday, April 21, 2025
HomeAndroidBeware of an Android Spyware Mandrake that went Undetected for Last 4...

Beware of an Android Spyware Mandrake that went Undetected for Last 4 Years

Published on

SIEM as a Service

Follow Us on Google News

Bitdefender Security Researchers identified a new, highly sophisticated spyware targeting Android users for financial motivations and distributed via Google Apps Market place.

Researchers named the threat “Mandrake” and estimated victim users were probably hundreds of thousands throughout the full 4-year period.

Malware has complete control over infected android phones as it can turn down the volume of the phone and block calls or messages, steal credentials, exfiltrate information, money transfers, and blackmailing.

- Advertisement - Google News

Malicious applications on Google Play:

Mandrake operators published seven malicious applications, “Abfix, CoinCast, SnapTune Vid, Currency XE Converter, Office Scanner, Horoskope, and Car News “on Google Play market place for creditability.

To disguise as a legitimate app, these apps have a dedicated microsite, a Facebook page, social media accounts like Twitter, Telegram or Reddit and even YouTube channels to gain the user’s interest & trust to get victimized.

Researchers highlighted that “Besides posing as legit applications, the apps use extra techniques to avoid Google Play protection: they delay malicious activity greatly and work in stages.

These three stages are dropper, loader, and core. These functionalities have different roles and complexity. The dropper is considered the app that the victim installs from Google Play.

Android Spyware Mandrake
Mandrake Malware Chain

One cannot predict when they will get the loader and the core components, which will be downloaded by the dropper at some point when the attacker issues the command (or possibly never)”.

Threat Infrastructure

Mandrake used several hardcoded Command and Control servers as mentioned below and most of them were active for the full 4 years.  Researcher spot an active C2 server androidfirmware(.)top associated with ip address “159.69.66.184” and hosting provided by  “Hetzner Online GmbH” in Germany location.

DomainRegistration Date
rendfiles.top11-02-2016
androidfrimware.com06-04-2016
android-soft.top09-04-2016
androidfirmware.ca06-06-2016
nfmmlrkagflemt.top17-11-2016
xjkbhysexthnpl.top23-11-2016
livingstream.mobi14-12-2016
androidfirmware.top21-08-2019
Known C2 Servers

The malicious applications hosted on Google play targets mostly banking applications such as CommBank, NAB Mobile Banking, Westpac Mobile Banking, Bankwest, Bendigo Bank, St.George MobileBanking, ING Australia Banking, AustralianSuper, Beyond Bank Australia.

Other target applications belonged to cryptocurrency, communications, a gaming application, and product category. For example: PayPal Mobile Cash: Send and Request Money Fast, Microsoft Outlook: Organize Your Email & Calendar, Google Pay: Pay with your phone and send cash, Amazon Shopping – Search Fast, Browse Deals Easy, AliExpress – Smarter Shopping, Better Living, Coinbase – Buy & Sell Bitcoin, Crypto Wallet, Blockchain Wallet-Bitcoin, Bitcoin Cash, Ethereum and VIP Access.

This campaign masters all elements of a professional spyware platform,this attack is most likely financially motivated. This threat can easily defeat two-factor authentication (2FA) codes that some banks send to prevent fraud.

It conducts phishing attack on targeted application, by loading a webpage and injecting a specially crafted JavaScript code to retrieve all data from input forms loaded in an overlay web component.In some cases, for legitimate apps that are themselves webviews, the user is not aware he’s interactingwith a credential-stealing page.

As a backup measure in case JavaScript injection fails, the screen is also recorded, this MP4 recording is saved as <timestamp>.dat in the private files dir and it is later sent to the C2 server with a post request to URL http://androidfirmware.top:8888/?r=<victim UID>.

Android Spyware Mandrake
Phishing attack – An overlay screen

Mandrake targets specific countries: Australia, Canada, United States, Poland, Netherlands, Germany, Austria, Italy, Spain, United Kingdom, Belgium, Brazil, CzechRepublic, and Singapore”, besides targeting globally utilized popular applications.

It was observed that more than 40 different targeted banking applications that serve Australian users.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Latest articles

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing...

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has...

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning...

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing...

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has...

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning...