Security News > 2021 > November > APT C-23 Hackers Using New Android Spyware Variant to Target Middle East Users
A threat actor known for striking targets in the Middle East has evolved its Android spyware yet again with enhanced capabilities that allow it to be stealthier and more persistent while passing off as seemingly innocuous app updates to stay under the radar.
The new variants have "Incorporated new features into their malicious apps that make them more resilient to actions by users, who might try to remove them manually, and to security and web hosting companies that attempt to block access to, or shut down, their command-and-control server domains," Sophos threat researcher Pankaj Kohli said in a report published Tuesday.
Also known by the monikers VAMP, FrozenCell, GnatSpy, and Desert Scorpion, the mobile spyware has been a preferred tool of choice for the APT-C-23 threat group since at least 2017, with successive iterations featuring extended surveillance functionality to vacuum files, images, contacts and call logs, read notifications from messaging apps, record calls, and dismiss notifications from built-in Android security apps.
In the past, the malware has been distributed via fake Android app stores under the guise of AndroidUpdate, Threema, and Telegram.
The latest campaign is no different in that they take the form of apps that purport to install updates on the target's phone with names such as App Updates, System Apps Updates, and Android Update Intelligence.
The app not only changes its icon to hide behind popular apps such as Chrome, Google, Google Play, and YouTube, in the event the user were to click the fraudulent icon, the legitimate version of the app is launched, while running surveillance tasks in the background.
- Researchers Uncover New Android Spyware With C2 Server Linked to Turla Hackers (source)
- U.S. Warns of APT Hackers Targeting ICS/SCADA Systems with Specialized Malware (source)
- Bitter APT Hackers Add Bangladesh to Their List of Targets in South Asia (source)
- Cytrox's Predator Spyware Targeted Android Users with Zero-Day Exploits (source)