Friday, April 25, 2025
HomeAndroidDocSwap Malware Masquerades as Security Document Viewer to Attack Android Users Worldwide

DocSwap Malware Masquerades as Security Document Viewer to Attack Android Users Worldwide

Published on

SIEM as a Service

Follow Us on Google News

The cybersecurity landscape has witnessed a new threat with the emergence of the DocSwap malware, which disguises itself as a “Document Viewing Authentication App” to deceive users into installing it on their Android devices.

This sophisticated malware is suspected to be linked to a North Korean-backed Advanced Persistent Threat (APT) group, as revealed by the S2W Threat Intelligence Center in a recent report.

Malware Analysis and Features

The malicious app employs an XOR operation to decrypt a “security.db” file within its package.

- Advertisement - Google News

It dynamically loads a DEX file and communicates with a Command and Control (C2) server to execute malicious commands.

These commands include keylogging and various forms of information theft, such as camera and microphone recording, as well as file downloading and deletion.

The app’s name and the presence of Korean-language strings suggest it primarily targets mobile users in South Korea.

However, its capabilities pose a threat to Android users worldwide.

Attribution and Detection

When initially discovered, the C2 infrastructure associated with DocSwap included a phishing page masquerading as CoinSwap.

By February 27, 2025, accessing the C2 address revealed a Naver favicon and the message “Million OK !!!!”, hinting at a possible connection to the Kimsuky group, a known North Korean-backed threat actor.

According tot the Report, The S2W Threat Research and Intelligence Center has designated the threat actors using DocSwap as “puNK-004,” part of their tracking efforts for unidentified threat groups linked to North Korea.

To protect against DocSwap, users should exercise caution when installing apps from unknown sources and avoid executing suspicious links or email attachments.

The malware’s ability to perform keylogging through accessibility services and its communication with the C2 server for malicious commands underscore the need for robust security measures.

Organizations and individuals are advised to stay vigilant and implement threat detection systems capable of identifying such advanced threats.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Microsoft’s Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw

Microsoft’s recent attempt to resolve a critical privilege escalation vulnerability has inadvertently introduced a...

SAP NetWeaver 0-Day Vulnerability Enables Webshell Deployment

Cybersecurity analysts have issued a high-priority warning after several incidents revealed active exploitation of...

U.S. Secret Service Reveals Ways to Identify Credit Card Skimmers

With credit card skimming crimes escalating nationwide, the U.S. Secret Service’s Washington Field Office...

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft’s Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw

Microsoft’s recent attempt to resolve a critical privilege escalation vulnerability has inadvertently introduced a...

SAP NetWeaver 0-Day Vulnerability Enables Webshell Deployment

Cybersecurity analysts have issued a high-priority warning after several incidents revealed active exploitation of...

U.S. Secret Service Reveals Ways to Identify Credit Card Skimmers

With credit card skimming crimes escalating nationwide, the U.S. Secret Service’s Washington Field Office...