Categories: Malware

Hacking Group Spies on and Steal Data from Android Users Posing Actress Nude Photos

Security researchers from Trend Micro discovered malicious apps that spies on and steal data from Android users. Malicious apps dubbed as PoriewSpy steals sensitive information from victims’ such as contacts, location, call logs, SMS, and files in SD cards.

Researchers believe these malicious apps were distributed by a hacking group that targets Indian Government officials before and they suspect these malicious built using DroidJack or SandroRAT based on C&C servers.

Attackers used open source projects android-swipe-image-viewer, or Android Image Viewer for malware development and they have added some additional components and the campaign targetting Android users in India.

Malicious Apps Distribution

PoriewSpy pushed automatically from the malicious websites that visited by users and these apps are named after Indian model-actress. Once launched it will turn your phone into an audio recorder.

Also Read Malicious Code in Kids Game Apps on Google Play Pushing Porn Ads – More than 60 Game Apps Infected

If the malicious apps launched it would initially show up with the nude photos of an Indian actress, but later it hides it app icon from user’s sight. Trend Micro published a detailed analysis report.

                                                   Services
AudioRecordMain espionage component
LogServiceFor log collection
RecordServiceAudio record
“When the user calls using an infected device, the malware will start recording the audio, which it saves to /sdcard/ /.googleplay.security/ named as “_VoiceCall_” + currentTime. It can also turn the mobile device into an audio recorder to timely record audio every 60 seconds even when the user is not having a phone call”, Researchers said.

The malware not only records the audio, it is also capable of stealing contacts, SMS, call logs, and location information.

A hacking group behind PoriewSpy built a number of the malicious app using DroidJack and they are disguised as freeCall, BatterySavor, Secure_Comm, and Nexus_Compatability.“In our research, we also found a malicious app, named after an Indian model-actress, which bears similarities to the code of PoriewSpy apps. Created in 2014, we speculate that this is an earlier version of PoriewSpy that also shares the same C&C server with some of the latest ones”, Researchers said.

Command and Control Servers – PoriewSpy

C&C servers for PoriewSpy and DroidJack-built apps based in Germany, France, and the UK. Both of the malware campaigns became active in the same period of time.

C&C IP’s

5[.]189[.]137[.]8
5[.]189[.]145[.]248
93[.]104[.]213[.]217
88[.]150[.]227[.]71
62[.]4[.]2[.]211
draagon[.]ddns[.]net

Mitigations

  • Give careful consideration to the permission asked for by applications.
  • Download applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
  • Make frequent backups of important data.
  • Install anti-malware on their devices.
  • Stay strict with CIA Cycle.
Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…

1 day ago

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…

1 day ago

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…

1 day ago

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…

1 day ago

Araneida Scanner – Hackers Using Cracked Version Of Acunetix Vulnerability Scanner

Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…

3 days ago

A Dark Web Operation Acquiring KYC Details TO Bypass Identity Verification Systems

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…

3 days ago