Sunday, 23 February 2025
28.8 C
Singapore
32 C
Thailand
23.4 C
Indonesia
26.6 C
Philippines

ESET Research discovers eXotic Visit campaign, targeted attack via fake messaging apps, available on web and Google Play

ESET researchers discover an Android spyware campaign, eXotic Visit, using apps posing as messengers to target users in India and Pakistan.

ESET researchers have discovered an active espionage campaign targeting Android users with apps primarily posing as messaging services. While these apps offer functional services as bait, they are bundled with the open-source XploitSPY malware. ESET has named this campaign eXotic Visit and has tracked its activities from November 2021 through to the end of 2023. The targeted campaign has been distributing malicious Android apps through dedicated websites and, for a period of time, through the Google Play store as well. Because of the targeted nature of the campaign, the apps available on Google Play had a low number of installs; all of them have been removed from the store. In this likely targeted attack, the eXotic Visit campaign appears to primarily target a select group of Android users in Pakistan and India. There is no indication that this campaign is linked to any known group; however, ESET is tracking the threat actors behind it under the moniker Virtual Invaders.

Apps that contain XploitSPY can extract contact lists and files; extract the deviceโ€™s GPS location; and extract the names of files listed in specific directories related to the camera, downloads, and various messaging apps such as Telegram and WhatsApp. If certain filenames are deemed to be of interest, they can subsequently be extracted from these directories via an additional command from the command and control (C&C) server. Interestingly, the implementation of the chat functionality integrated with XploitSPY is unique; we strongly believe that this chat function was developed by the Virtual Invaders group.

The malware also uses a native library, which is often used in Android app development for improving performance and accessing system features. However, in this case, the library is used to hide sensitive information, like the addresses of the C&C servers, making it harder for security tools to analyze the app.

The apps โ€“ Dink Messenger, Sim Info, and Defcom โ€“ were taken down from Google Play; moreover, as a Google App Defense Alliance partner, ESET identified ten additional apps that contain code that is based on XploitSPY and shared its findings with Google. Following the ESET alert, the apps were removed from the store. Each of the apps had a low number of installs, suggesting a targeted approach rather than a broad strategy. Overall, around 380 victims have downloaded the apps from websites and Google Play store and created accounts to use their messaging functionality. Because of the targeted nature of the campaign, the number of installs of each app from Google Play is relatively low โ€“ between zero and 45.

ESET has identified the malicious code used as a customised version of the open-source Android RAT, XploitSPY. It is bundled with legitimate app functionality, most of the time being a fake, but functioning, messaging application. The campaign has evolved over the years to include obfuscation, emulator detection, and hiding of C&C addresses.

XploitSPY is widely available, and customised versions have been used by multiple threat actors such as the Transparent Tribe APT group, as documented by Meta. However, the modifications found in the apps are distinctive and differ from those in previously documented variants of the XploitSPY malware.

For more technical information about the eXotic Visit campaign, see the blog post โ€œeXotic Visit campaign: Tracing the footprints of Virtual Invaders.โ€

Hot this week

Apple may introduce reverse wireless charging on iPhone 17 Pro

Apple may introduce reverse wireless charging in the iPhone 17 Pro, allowing users to power AirPods and Apple Watch without extra cables.

ASUS launches ZenScreen Duo OLED MQ149CD, a portable monitor with dual OLED displays

ASUS unveils the ZenScreen Duo OLED MQ149CD, a portable dual-screen monitor with OLED technology, delivering stunning visuals and flexible work setups.

Pop Mart and CapitaLand launch love-themed CryBaby collaboration

Pop Mart and CapitaLand are bringing love to the malls with a CryBaby-themed collaboration that will run until March 14.

Xiaomi 15 Ultra clears IMDA registration, set to launch in Singapore

Xiaomi 15 Ultra has cleared IMDA registration, indicating a Singapore launch soon after MWC 2025. Find out what this means for buyers.

Sonar acquires AutoCodeRover to boost AI-powered software development

Sonar acquires AutoCodeRover to enhance AI-powered coding, automating debugging, improving security, and speeding up software development.

BT and Equinix expand partnership to enhance global interconnectivity

BT and Equinix expand their partnership to boost interconnectivity for multinational businesses, deploying BTโ€™s Global Fabric NaaS in 40+ Equinix data centres worldwide.

LG unveils new SKS branding for luxury kitchen suite at KBIS 2025

LG rebrands Signature Kitchen Suite to SKS at KBIS 2025, introducing new luxury appliances like a free-zone induction range and an advanced island system.

LG unveils advanced laundry solutions at KBIS 2025

LG unveils its latest heat pump washer and dryer lineup at KBIS 2025, featuring AI-driven efficiency, ventless design, and smart connectivity.

The Vision Pro is now easier to share, and getting a new iPhone app

Appleโ€™s Vision 2.4 update makes sharing the Vision Pro easier, introduces a new iPhone app for content discovery, and adds the Spatial Gallery app.

Related Articles