Article Details

Scrape Timestamp (UTC): 2024-04-10 14:47:30.138

Source: https://thehackernews.com/2024/04/exotic-visit-spyware-campaign-targets.html

Original Article Text

Click to Toggle View

'eXotic Visit' Spyware Campaign Targets Android Users in India and Pakistan. An active Android malware campaign dubbed eXotic Visit has been primarily targeting users in South Asia, particularly those in India and Pakistan, with malware distributed via dedicated websites and Google Play Store. Slovak cybersecurity firm said the activity, ongoing since November 2021, is not linked to any known threat actor or group. It's tracking the group behind the operation under the name Virtual Invaders. "Downloaded apps provide legitimate functionality, but also include code from the open-source Android XploitSPY RAT," ESET security researcher Lukáš Štefanko said in a technical report released today. The campaign is said to be highly targeted in nature, with the apps available on Google Play having negligible number of installs ranging from zero to 45. The apps have since been taken down. The fake-but-functional apps primarily masquerade as messaging services like Alpha Chat, ChitChat, Defcom, Dink Messenger, Signal Lite, TalkU, WeTalk, Wicker Messenger, and Zaangi Chat. Approximately 380 victims are said to have downloaded the apps and created accounts to use them for messaging purposes. Also employed as part of eXotic Visit are apps such as Sim Info and Telco DB, both of which claim to provide details about SIM owners simply by entering a Pakistan-based phone number. Other applications pass off as a food ordering service in Pakistan as well as a legitimate Indian hospital called Specialist Hospital (now rebranded as Trilife Hospital). XploitSPY, uploaded to GitHub as early as April 2020 by a user named RaoMK, is associated with an Indian cyber security solutions company called XploitWizer. It has also been described as a fork of another open-source Android trojan called L3MON, which, in turn, draws inspiration from AhMyth. It comes with a wide gamut of features that allows it to gather sensitive data from infected devices, such as GPS locations, microphone recordings, contacts, SMS messages, call logs, and clipboard content; extract notification details from apps like WhatsApp, Facebook, Instagram, and Gmail; download and upload files; view installed apps; and queue commands. On top of that, the malicious apps are designed to take pictures and enumerate files in several directories related to screenshots, WhatApp, WhatsApp Business, Telegram, and an unofficial WhatsApp mod known as GBWhatsApp. "Throughout the years, these threat actors have customized their malicious code by adding obfuscation, emulator detection, hiding of [command-and-control] addresses, and use of a native library," Štefanko said. The main purpose of the native library ("defcome-lib.so") is to keep the C2 server information encoded and hidden from static analysis tools. If an emulator is detected, the app makes use of a fake C2 server to evade detection. Some of the apps have been propagated through websites specifically created for this purpose ("chitchat.ngrok[.]io") that provide a link to an Android package file ("ChitChat.apk") hosted on GitHub. It's presently not clear how victims are directed to these apps. "Distribution started on dedicated websites and then even moved to the official Google Play store," Štefanko concluded. "The purpose of the campaign is espionage and probably is targeting victims in Pakistan and India." Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.

Daily Brief Summary

MALWARE // 'eXotic Visit' Spyware Targets Android Users in South Asia

An Android malware campaign, named eXotic Visit, has been active since November 2021, targeting users primarily in India and Pakistan.

The spyware is distributed through dedicated websites and also appeared on the Google Play Store, hidden within apps that offer legitimate services but contain malicious code.

The malware, derived from the open-source XploitSPY RAT, can access sensitive data such as GPS locations, microphone recordings, contacts, SMS messages, call logs, and clipboard content.

Approximately 380 victims downloaded and used the spyware-infected apps for messaging, believing them to be legitimate applications.

The apps masqueraded under names like Alpha Chat, ChitChat, and others, and included functionalities like providing SIM owner details or posing as a food ordering service.

The threat group, tracked as Virtual Invaders, utilizes advanced tactics like code obfuscation, emulator detection avoidance, and hiding command-and-control server addresses.

Slovak cybersecurity firm ESET, who reported the findings, emphasizes that while the apps have been taken down from Google Play, the campaign's main purpose appears to be espionage targeting specific regions.