Chat apps laced with spyware removed from Google Play

Researchers have located thousands of Android apps containing malware that turns a phone into completely-fledged software for spying on targets.

Two of the malicious chat apps, Hulk Messenger and Troy Chat, have been recently eliminated from Google’s Play store though it’s no longer clear whether Google booted them or the developer took them down.

Google also eliminated an extra app, Soniac, which contained the same malware that safety organization Lookout calls SonicSpy, which has been injected into several hundred Android apps that have been aggressively promoted with the aid of developer considering February.

Consistent with Lookout, SonicSpy apps can record audio, take snap shots with the digicam, make calls, and ship textual content messages to numbers chosen via the attacker. It also leaks name logs, contacts, and wi-fi entry point knowledge to the attacker.

The trojan apps do offer messaging performance via a custom variation of privateness-centered messaging app Telegram that’s been rigged with hid spying capabilities. It is functioning chat facets may just help give an explanation for why Soniac was once downloaded via as many as 5,000 Play retailer customers.


Once hooked up, the malicious app gets rid of its icon to make certain it goes neglected by the goal and problematic to get rid of. The malware then connects to the attacker’s domain and makes an attempt to install the customized version of Telegram.

The SonicSpy malware is it seems that just like malware known as SpyNote, which researchers at Palo Alto Networks found out final year after a laptop-headquartered Android adware builder kit used to be allotted on hacker forums.

The builder allowed any individual to create new variations of SpyNote with an identical spying capabilities to SonicSpy. SpyNote-laced apps nonetheless weren’t distributed on Google’s Play retailer, marking a key difference. Most often it can be reliable to down load apps from Google’s legit app store, which offers many extra obstacles for distributing malware than third-get together Android app stores.

Lookout researchers consider the same man or woman is in the back of the progress of SpyNote and SonicSpy due shared design elements.


“within the case of SpyNote, the attacker used a customized-constructed desktop software to inject malicious code into designated apps in order that a victim would still engage with the authentic functionality of the trojanized apps,” writes Lookout’s Michael Flossman.

“due to the consistent stream of SonicSpy apps it seems possible that the actors behind it are utilising a identical computerized-construct method, nonetheless their computer tooling has now not been recovered at this point in time.”

just before the February uptick in SonicSpy distribution efforts, protection corporation ZScaler earlier discovered a hundred and twenty fake versions of standard Android apps, corresponding to WhatsApp, Netflix, and fb, that had been rigged with SpyNote.



This site uses Akismet to reduce spam. Learn how your comment data is processed.