Raleigh, NC

32°F
Overcast Clouds Humidity: 86%
Wind: 6.82 M/S

Spyware Alert Android Users Lured by Fake Messaging Apps

Spyware Alert Android Users Lured by Fake Messaging Apps

Two new spyware operations, dubbed ProSpy and ToSpy, have been discovered luring Android users with fake updates and plugins for the Signal and ToTok messaging apps to steal sensitive data. 

Targeting and Distribution 

The malicious campaigns are targeting users primarily in the United Arab Emirates (UAE). To appear legitimate, the threat actor distributed the spyware through fraudulent websites that closely impersonated the official Signal and ToTok platforms. ToTok, developed by the UAE-based company G42, was previously removed from app stores over spying allegations but is currently available through its official site and third-party stores. 

Researchers at ESET identified the campaigns, which they believe may have started as early as 2022 for ToSpy and 2024 for ProSpy. The campaigns use two previously unknown spyware families disguised as a "Signal Encryption Plugin" and a "ToTok Pro" variant, neither of which actually exists. 

Spyware Functionality and Stealth 

When executed, both malware families request permissions typical of messenger apps, such as access to contacts, SMS, and files. Once active on a device, the spyware aggressively exfiltrates the following data: 

  • Device information Hardware, operating system, and IP address. 
  • Stored SMS texts and contact lists. 
  • Files Audio, documents, images, and videos. 
  • ToTok backup files. 
  • List of installed applications. 

To avoid detection, the ProSpy malware, disguised as the Signal plugin, uses the 'Play Services' icon and label. Tapping the icon simply opens the information screen for the legitimate Google Play Services app. Similarly, when the ToSpy malware is opened, it launches the real ToTok app to avoid arousing user suspicion. 

Persistence Mechanisms 

Both spyware families employ three sophisticated methods to maintain persistence on infected devices: 

  • Abusing the 'AlarmManager' This Android system API is used to automatically restart the malware if the system kills its process. 
  • Using a foreground service A persistent notification keeps the process running as a high-priority service. 
  • Registering for BOOT_COMPLETED events This allows the spyware to restart automatically after a device reboot without any user interaction. 

While attribution for the attacks remains inconclusive, Android users are strongly advised to download apps only from official or trusted repositories and keep the Play Protect service active to disable known threats. 

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.