Beware of an Android Spyware Mandrake that went Undetected for Last 4 Years

Bitdefender Security Researchers identified a new, highly sophisticated spyware targeting Android users for financial motivations and distributed via Google Apps Market place.

Researchers named the threat “Mandrake” and estimated victim users were probably hundreds of thousands throughout the full 4-year period.

Malware has complete control over infected android phones as it can turn down the volume of the phone and block calls or messages, steal credentials, exfiltrate information, money transfers, and blackmailing.

Malicious applications on Google Play:

Mandrake operators published seven malicious applications, “Abfix, CoinCast, SnapTune Vid, Currency XE Converter, Office Scanner, Horoskope, and Car News “on Google Play market place for creditability.

To disguise as a legitimate app, these apps have a dedicated microsite, a Facebook page, social media accounts like Twitter, Telegram or Reddit and even YouTube channels to gain the user’s interest & trust to get victimized.

Researchers highlighted that “Besides posing as legit applications, the apps use extra techniques to avoid Google Play protection: they delay malicious activity greatly and work in stages.

These three stages are dropper, loader, and core. These functionalities have different roles and complexity. The dropper is considered the app that the victim installs from Google Play.

Android Spyware MandrakeAndroid Spyware Mandrake
Mandrake Malware Chain

One cannot predict when they will get the loader and the core components, which will be downloaded by the dropper at some point when the attacker issues the command (or possibly never)”.

Threat Infrastructure

Mandrake used several hardcoded Command and Control servers as mentioned below and most of them were active for the full 4 years.  Researcher spot an active C2 server androidfirmware(.)top associated with ip address “159.69.66.184” and hosting provided by  “Hetzner Online GmbH” in Germany location.

DomainRegistration Date
rendfiles.top11-02-2016
androidfrimware.com06-04-2016
android-soft.top09-04-2016
androidfirmware.ca06-06-2016
nfmmlrkagflemt.top17-11-2016
xjkbhysexthnpl.top23-11-2016
livingstream.mobi14-12-2016
androidfirmware.top21-08-2019
Known C2 Servers

The malicious applications hosted on Google play targets mostly banking applications such as CommBank, NAB Mobile Banking, Westpac Mobile Banking, Bankwest, Bendigo Bank, St.George MobileBanking, ING Australia Banking, AustralianSuper, Beyond Bank Australia.

Other target applications belonged to cryptocurrency, communications, a gaming application, and product category. For example: PayPal Mobile Cash: Send and Request Money Fast, Microsoft Outlook: Organize Your Email & Calendar, Google Pay: Pay with your phone and send cash, Amazon Shopping – Search Fast, Browse Deals Easy, AliExpress – Smarter Shopping, Better Living, Coinbase – Buy & Sell Bitcoin, Crypto Wallet, Blockchain Wallet-Bitcoin, Bitcoin Cash, Ethereum and VIP Access.

This campaign masters all elements of a professional spyware platform,this attack is most likely financially motivated. This threat can easily defeat two-factor authentication (2FA) codes that some banks send to prevent fraud.

It conducts phishing attack on targeted application, by loading a webpage and injecting a specially crafted JavaScript code to retrieve all data from input forms loaded in an overlay web component.In some cases, for legitimate apps that are themselves webviews, the user is not aware he’s interactingwith a credential-stealing page.

As a backup measure in case JavaScript injection fails, the screen is also recorded, this MP4 recording is saved as <timestamp>.dat in the private files dir and it is later sent to the C2 server with a post request to URL http://androidfirmware.top:8888/?r=<victim UID>.

Phishing attack – An overlay screen

Mandrake targets specific countries: Australia, Canada, United States, Poland, Netherlands, Germany, Austria, Italy, Spain, United Kingdom, Belgium, Brazil, CzechRepublic, and Singapore”, besides targeting globally utilized popular applications.

It was observed that more than 40 different targeted banking applications that serve Australian users.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

HemaVijay

Recent Posts

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks

Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site scripting…

45 minutes ago

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed a…

1 hour ago

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the "SonicBoom Attack Chain," which…

2 hours ago

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis

A researcher has unveiled a novel integration between AI-powered Copilot and Microsoft's WinDbg, dramatically simplifying…

3 hours ago

Apache Parquet Java Vulnerability Enables Remote Code Execution

A high-severity vulnerability (CVE-2025-46762) has been discovered in Apache Parquet Java, exposing systems using the…

3 hours ago

NCSC Warns of Ransomware Attacks Targeting UK Organisations

National Cyber Security Centre (NCSC) has issued technical guidance following a series of cyber attacks…

5 hours ago