Researchers Uncover New Android Spyware With C2 Server Linked ...
Có thể bạn quan tâm
Researchers Uncover New Android Spyware With C2 Server Linked to Turla Hackers
An Android spyware application has been spotted masquerading as a "Process Manager" service to stealthily siphon sensitive information stored in the infected devices.
Interestingly, the app — that has the package name "com.remote.app" — establishes contact with a remote command-and-control server, 82.146.35[.]240, which has been previously identified as infrastructure belonging to the Russia-based hacking group known as Turla.
"When the application is run, a warning appears about the permissions granted to the application," Lab52 researchers said. "These include screen unlock attempts, lock the screen, set the device global proxy, set screen lock password expiration, set storage encryption and disable cameras."
Once the app is "activated," the malware removes its gear-shaped icon from the home screen and runs in the background, abusing its wide permissions to access the device's contacts and call logs, track its location, send and read messages, access external storage, snap pictures, and record audio.
The gathered information is captured in a JSON format and subsequently transmitted to the aforementioned remote server. Despite the overlap in the C2 server used, Lab52 said it doesn't have enough evidence to definitively attribute the malware to the Turla group.
Also unknown at this stage is the exact initial access vector employed for distributing the spyware and intended targets of the campaign.
That said, the rogue Android app also attempts to download a legitimate application called Roz Dhan (meaning "Daily Wealth" in Hindi) that has over 10 million installations and allows users to earn cash rewards for completing surveys and questionnaires.
"The application, [which] is on Google Play and is used to earn money, has a referral system that is abused by the malware," the researchers said. "The attacker installs it on the device and makes a profit."
Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post. SHARE Tweet Share Share Share Share on Facebook Share on Twitter Share on Linkedin Share on Reddit Share on Hacker News Share on Email Share on WhatsApp
Cybersecurity Webinars
Redefining Cloud Incident ResponseLearn How to Investigate Faster with AI-Powered Cloud Forensics
Join Wiz experts to see how AI and context-aware forensics make cloud investigations faster, clearer, and more reliable.
Register Inside the Quantum ThreatLearn Quantum-Safe Practices to Stop Future Decrypt Attacks
Quantum computers could soon break today’s encryption—join Zscaler’s webinar to learn how post-quantum cryptography keeps your data safe for the future.
Register Latest News Cybersecurity Resources
Zero Trust + AI: Thrive in the AI Era and Remain ResilientZero Trust Everywhere - protection across your workforce, branches, and clouds, and GenAI..
Stop AI-Powered Threats and Protect Sensitive Data with Zscaler Zero Trust + AICompanies must replace legacy firewalls, VPNs, and exposed IPs with a Zero Trust + AI security model to protect AI usage and stop AI-driven attacks.
Earn a Master's in Cybersecurity Risk ManagementLead the future of cybersecurity risk management with an online Master’s from Georgetown. Expert Insights Articles Videos
When Your Browser Becomes The Attacker: AI Browser Exploits
February 2, 2026
How to Secure Your Mid-Market Business Across the Complete Threat Lifecycle
February 2, 2026
CTM360 Research Reveals 30,000+ Fake Online Shops Impersonating Fashion Brands
February 2, 2026
9 Identity Security Predictions for 2026
February 2, 2026 Get Latest News in Your InboxGet the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.
EmailTừ khóa » C2 Hack 2020
-
What Is C2? Command And Control Infrastructure Explained - Varonis
-
Hack The C2 - 2020 Defenit CTF - CTFTime
-
Hack The Box — Sauna Write-up(w/ Covenant C2) | By Sif0
-
Breaking The Covenant: Researcher Discovers Critical Flaw In Open ...
-
C2 · GitHub Topics
-
Nuages - A Modular C2 Framework - Hacking Land
-
WSC2 - A WebSocket C2 Tool - Hacking Land
-
EN GÜNCEL C2 HACK - YouTube
-
Microsoft Partnered With Security Firms To Sinkhole SolarWinds Hack ...
-
Adversary Emulation And The C2 Matrix - SANS Institute
-
FBI Warning: China-based Hacking Group APT41 Hacks Into Over ...
-
Hackers Hide Malware C2 Communication By Faking News Site Traffic
-
0xdf Hacks Stuff | CTF Solutions, Malware Analysis, Home Lab ...