New Android Malware GhostSpy Grants Attackers Full Control Over Infected Devices

New Android Malware GhostSpy Grants Attackers Full Control Over Infected Devices

A chilling new Android malware, dubbed GhostSpy, has emerged as a significant threat to mobile security, according to a detailed report by CYFIRMA.

This high-risk malware employs advanced evasion, persistence, and surveillance techniques to seize complete control over infected devices.

With capabilities ranging from keylogging to bypassing banking app protections, GhostSpy poses a severe risk to personal privacy and financial security.

– Advertisement –

Its multi-stage infection process and stealthy tactics make it a formidable challenge for both individual users and enterprise security teams.

A Sophisticated Threat to Android Security

GhostSpy begins its attack with a deceptive dropper APK that exploits Android’s Accessibility Services and UI automation to silently install a secondary payload, “update.apk,” without user interaction.

GhostSpy
removing the initial APK from the device

By simulating clicks and bypassing permission dialogs, the malware auto-grants itself extensive privileges, including access to phone state, SMS, call logs, camera, microphone, and even Device Admin rights.

Once embedded, it establishes a persistent connection to command-and-control (C2) servers, enabling real-time data theft and remote device manipulation.

Its arsenal includes screen capture, audio and video recording, GPS tracking, and SMS interception, alongside the ability to execute unauthorized financial transactions by reconstructing the UI of secure banking apps using skeleton view methods effectively sidestepping screenshot restrictions.

Unpacking GhostSpy’s Lethal Arsenal

The malware’s persistence is equally alarming. GhostSpy deploys anti-uninstall mechanisms by monitoring system UI for removal attempts and overlaying fake warning dialogs to intimidate users into abandoning uninstallation.

GhostSpy
Dropper 

It leverages full-screen overlays to obscure its activities and uses encrypted code to evade detection.

Additionally, its spying features harvest sensitive data like passwords, OTPs, and 2FA codes from authenticator apps, while also stealing personal files, contacts, and call logs.

The malware’s connection to C2 infrastructure, including domains like stealth[.]gstpainel[.]fun and IP addresses such as 37[.]60[.]233[.]14, facilitates continuous exfiltration and control, with evidence suggesting active maintenance by threat actors, possibly based in Brazil, given cultural and linguistic ties observed in related Telegram and YouTube channels.

According to Cyfirma Report, this sophisticated strain’s ability to maintain long-term access and resist conventional removal methods underscores the urgency for robust defenses.

Security experts recommend strict app whitelisting, mobile threat defense (MTD) solutions, and regular OS updates to mitigate risks.

User education on avoiding sideloading and monitoring for suspicious Accessibility Service usage is also critical.

As GhostSpy continues to evolve, integrating indicators of compromise (IOCs) into threat intelligence feeds and deploying behavioral analysis tools will be essential to detect and neutralize this pervasive threat.

Indicators of Compromise (IOCs)

S.N Indicators Type Context
1 e9f2f6e47e071ed2a0df5c75e787b2512ba8a601e55c91ab49ea837fd7a0fc85 APK Dropper APK
2 73e647287408b2d40f53791b8a387a2f7eb6b1bba1926276e032bf2833354cc4 APK Payload APK
3 https[:]//stealth[.]gstpainel[.]fun URL C2-exfiltration
4 37[.]60[.]233[.]14 IP C2-exfiltration
5 https[:]//gsttrust[.]org URL C2-exfiltration

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.