Wednesday, January 29, 2025
HomeCyber Security NewsSandStrike - Previously Unknown Android Malware Attacks Android Users Via VPN App

SandStrike – Previously Unknown Android Malware Attacks Android Users Via VPN App

Published on

SIEM as a Service

Follow Us on Google News

Android users are being targeted by threat actors using spyware known as SandStrike, which is delivered via malware-infected VPN applications. In short, threat actors have been circulating extremely stealthy and sophisticated spyware inside a VPN application.

Cybersecurity researchers at Kaspersky lab reported that an espionage campaign was carried out by threat actors using SandStrike in which they targeted the Persian-speaking minority religion, “Baháʼí,” this religion is mainly developed in some parts of the Middle East and Iran.

This malicious VPN app is being marketed by attackers as a simple method of evading censorship of religious materials in some particular parts of the world.

Distribution Channels for Malware

For distribution channels, threat actors actively target social media platforms with fake accounts on Facebook and Instagram with 1000 followers. With these fake social media accounts, threat actors redirect victims to a Telegram channel operated by them.

On the Telegram channel operated by the threat actors, several malicious links are provided to download and install the malicious VPN app. Though the app is malicious, but, it uses its own VPN infrastructure, which implies that the malicious VPN is completely practical and operational.

The fake accounts that are used by the threat actors are designed with religious-themed materials to target the followers of the Baháʼí religion.

With the installation of the VPN, the SandStrike also gets deployed on the targeted devices which has the ability to steal a wide range of sensitive data from the victims’ devices.

The data includes:-

  • Call logs
  • Contact lists
  • Spy on victims’ activities

APT Trends

There was a considerable amount of change in the tactics, toolsets, and techniques utilized by APT actors during the third quarter of 2022.

Among the new trends, we have mentioned a few of them:-

  • New advanced malware platform targeting telco companies, internet service providers, and universities
  • Upgrades to advanced and sophisticated tools are being made
  • APT campaigns continue to be focused on cyber-espionage as one of their main objectives

In early September, the telco industries, education sectors, and ISPs in Africa and the Middle East were plagued with a novel malware platform named Metatron.

Recommendation

Security analysts have come up with the following recommendations as a way to prevent being attacked by threat actors:-

  • Improve your cybersecurity team’s skills by upskilling them.
  • Access to the latest threat intelligence is one of the most critical things you can do for your SOC team.
  • EDR solutions that are enterprise-grade are recommended.
  • Endpoint protection is an essential part of your IT strategy.
  • Training on security awareness should be introduced.

Managed DDoS Attack Protection for Applications – Download Free Guide

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Vulnerability in Airline Integration Service enables A Hacker to Gain Entry To User Accounts

A recent security vulnerability in a widely used airline integration service has exposed millions...

Hackers Seize Control of 3,000 Companies Through Critical Vulnerabilities

In a groundbreaking cybersecurity investigation, researchers identified several critical vulnerabilities in a target system,...

PoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code Remotely

A critical vulnerability in the Cacti performance monitoring framework tracked as CVE-2025-22604, has been...

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Vulnerability in Airline Integration Service enables A Hacker to Gain Entry To User Accounts

A recent security vulnerability in a widely used airline integration service has exposed millions...

Hackers Seize Control of 3,000 Companies Through Critical Vulnerabilities

In a groundbreaking cybersecurity investigation, researchers identified several critical vulnerabilities in a target system,...

PoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code Remotely

A critical vulnerability in the Cacti performance monitoring framework tracked as CVE-2025-22604, has been...