Security News > 2022 > August > Hackers install Dracarys Android malware using modified Signal app

Hackers install Dracarys Android malware using modified Signal app
2022-08-09 14:02

Meta first reported the new Android malware in its Q2 2022 adversarial threat report, where they briefly mentioned its data-stealing, geo-locating, and microphone-activation capabilities.

While Meta mentions laced versions of Telegram, WhatsApp, and YouTube, Cyble's investigation only uncovered a trojanized version of the Signal messaging app.

The hacking group delivered the app to victims via a phishing page made to appear as a genuine Signal download portal, using the domain "Signalpremium[.]com," as shown below.

The threat actors also added the Dracarys malware to the source code when compiling the messaging app.

Dracarys also abuses the Accessibility Service to auto-grant additional permissions and continue running in the background even if the user closes the Signal app, raising its privileges and "Clicking" on the screen without user interaction.

Using social engineering to impersonate legitimate companies and people is rampant despite Meta's efforts to discover and block fake accounts, so hacking groups like Bitter APT are bound to continue to utilize new accounts to convince users to install their malware.


News URL

https://www.bleepingcomputer.com/news/security/hackers-install-dracarys-android-malware-using-modified-signal-app/

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Android 4 0 17 2 0 19
Signal 3 2 9 2 1 14