Google Blocked a new Spyware Family Lipizzan that is capable of extracting user’s email, SMS messages, location, voice calls, and media. They examined the code and it refers to famous cyber arm company Equus Technologies.
Lipizzan was blocked by Google in its early stage itself, they found around 20 Lipizzan apps and less than 100 devices in total. They keep on Enhancing Google Play Protect capabilities to block more sophisticated spyware attacks.
Also read Trojan Embedded Game BlazBlue Downloaded by More than Million Android Users from PlayStore
It is a sophisticated Multistaged spyware, the first stage was identified by Google play protect that imitate app like backup and Cleaner. After the installation, Lipizzan would load stage two “license verification” which survives infected device.
Then it would root the device with known exploits and extracts data to C&C server. It is capable of performing the following tasks.
Call recording
VOIP recording
Recording from the device microphone
Location monitoring
Taking screenshots
Taking photos with the device camera(s)
Fetching device information and files
Fetching user information (contacts, call logs, SMS, application-specific data)
Even though the app type and the stage downloading method changed, security experts from blocked it as soon after upload. You get a complete list of samples from Android developers blog page.
Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints a…
A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group, tracked…
In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure enterprise…
In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured Kubernetes…
A recently uncovered cyberattack campaign has brought steganography back into the spotlight, showcasing the creative…
Threat actors exploited a zero-day vulnerability in Ivanti Connect Secure, identified as CVE-2025-0282, to deploy…