Researchers Uncover New Android Spyware With C2 Server Linked ...
Có thể bạn quan tâm
Researchers Uncover New Android Spyware With C2 Server Linked to Turla Hackers
An Android spyware application has been spotted masquerading as a "Process Manager" service to stealthily siphon sensitive information stored in the infected devices.
Interestingly, the app — that has the package name "com.remote.app" — establishes contact with a remote command-and-control server, 82.146.35[.]240, which has been previously identified as infrastructure belonging to the Russia-based hacking group known as Turla.
"When the application is run, a warning appears about the permissions granted to the application," Lab52 researchers said. "These include screen unlock attempts, lock the screen, set the device global proxy, set screen lock password expiration, set storage encryption and disable cameras."
Once the app is "activated," the malware removes its gear-shaped icon from the home screen and runs in the background, abusing its wide permissions to access the device's contacts and call logs, track its location, send and read messages, access external storage, snap pictures, and record audio.
The gathered information is captured in a JSON format and subsequently transmitted to the aforementioned remote server. Despite the overlap in the C2 server used, Lab52 said it doesn't have enough evidence to definitively attribute the malware to the Turla group.
Also unknown at this stage is the exact initial access vector employed for distributing the spyware and intended targets of the campaign.
That said, the rogue Android app also attempts to download a legitimate application called Roz Dhan (meaning "Daily Wealth" in Hindi) that has over 10 million installations and allows users to earn cash rewards for completing surveys and questionnaires.
"The application, [which] is on Google Play and is used to earn money, has a referral system that is abused by the malware," the researchers said. "The attacker installs it on the device and makes a profit."
Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post. SHARE Tweet Share Share Share Share on Facebook Share on Twitter Share on Linkedin Share on Reddit Share on Hacker News Share on Email Share on WhatsApp
Cybersecurity Webinars
Redefining Cloud Incident ResponseLearn How to Investigate Faster with AI-Powered Cloud Forensics
Join Wiz experts to see how AI and context-aware forensics make cloud investigations faster, clearer, and more reliable.
Register Inside the Quantum ThreatLearn Quantum-Safe Practices to Stop Future Decrypt Attacks
Quantum computers could soon break today’s encryption—join Zscaler’s webinar to learn how post-quantum cryptography keeps your data safe for the future.
Register Latest News Cybersecurity Resources
Zero Trust + AI: Thrive in the AI Era and Remain ResilientZero Trust Everywhere - protection across your workforce, branches, and clouds, and GenAI..
Stop AI-Powered Threats and Protect Sensitive Data with Zscaler Zero Trust + AICompanies must replace legacy firewalls, VPNs, and exposed IPs with a Zero Trust + AI security model to protect AI usage and stop AI-driven attacks.
Earn a Master's in Cybersecurity Risk ManagementLead the future of cybersecurity risk management with an online Master’s from Georgetown. Expert Insights Articles Videos
When Your Browser Becomes The Attacker: AI Browser Exploits
February 2, 2026
How to Secure Your Mid-Market Business Across the Complete Threat Lifecycle
February 2, 2026
CTM360 Research Reveals 30,000+ Fake Online Shops Impersonating Fashion Brands
February 2, 2026
9 Identity Security Predictions for 2026
February 2, 2026 Get Latest News in Your InboxGet the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.
EmailTừ khóa » C2 Hack
-
What Is C2? Command And Control Infrastructure Explained - Varonis
-
Red Team: C2 Frameworks For Pentesting - Infosec Resources
-
Maintaining Access Part 2: A Deeper Look At C2 - Hackingloops
-
C2 To C3: Hackers Are Calling Home Using The Slack API ... - The Stack
-
Nuages - A Modular C2 Framework - Hacking Land
-
Not With A Bang But A Whisper: The Shift To Stealthy C2 | Threatpost
-
Sunburst's C2 Secrets Reveal Second-Stage SolarWinds Victims
-
Hack The Box — Sauna Write-up(w/ Covenant C2) | By Sif0
-
C2 · GitHub Topics