Android Spyware SpyNote Masquerading as Google Translate Found in Open Directories

Android Spyware SpyNote Masquerading as Google Translate Found in Open Directories

Our team stumbled upon a disturbing array of SpyNote spyware samples lurking in open directories across the internet.

These misconfigured digital repositories, often overlooked as mere storage spaces, have become unwitting hosts to dangerous malware targeting Android users.

Uncovering Hidden Threats in Open Digital Repositories

Disguised as legitimate applications like Google Translate, Temp Mail, and even Deutsche Postbank, these malicious Android Package (APK) files pose a severe threat to unsuspecting users by harvesting sensitive data under the guise of trusted software.

– Advertisement –

This discovery underscores the hidden dangers in seemingly innocuous corners of the web and emphasizes the urgent need for robust cybersecurity measures.

SpyNote, a notorious Android spyware, has been a growing menace since its source code was leaked in late 2022, enabling cybercriminals to customize and deploy it with alarming ease.

The malware exploits accessibility services and device administrator privileges to siphon critical information such as device location, SMS messages, and contacts.

Hunt analysis revealed multiple SpyNote samples mimicking legitimate apps with striking precision.

Android Spyware
Tags for SpyNote samples in open directories

Technical Breakdown of SpyNote’s Deceptive Operations

For instance, a file named “Translate.apk,” hosted on an AWS server at IP 18.219.97.209:8081, replicates the Google Translate interface flawlessly.

However, a developer oversight leaving a placeholder text “Enable [MY-NAME]” in the accessibility permission request betrays its malicious intent.

Android Spyware
Accessibility services request screen 

Post-installation, the app initiates network requests to a Command and Control (C2) server at kyabhai.duckdns.org:8080, facilitating covert data exfiltration.

Similarly, another sample, “Temp_20Mail.apk,” hosted on a SonderCloud Limited server at 156.245.13.61:8000, masquerades as the Temp Mail app for disposable email generation, while beaconing to a C2 IP at 156.245.20.17:7771.

A third sample, “postbank.apk,” impersonates a German banking app, communicating with a C2 domain oebonur600.duckdns.org on IP 95.214.177.114:3210, hosted via Cloudflare London, further illustrating the sophisticated infrastructure behind these threats.

The findings, cataloged on the Hunt platform, highlight over 40 SpyNote APKs in open directories, each leveraging dynamic domains and shifting C2 servers to evade detection.

Historical data spanning two months reveals the persistent activity of this spyware, often sharing server space with other malware like Cobalt Strike and Sliver binaries targeting Windows systems.

The implications are dire once installed, these apps can continuously transmit stolen data to remote servers, compromising user privacy and security.

The deceptive use of legitimate app icons and interfaces makes it challenging for users to distinguish malicious software from genuine applications, amplifying the risk of infection.

This situation is a stark reminder of the evolving tactics employed by cybercriminals to exploit trust in everyday digital tools.

The proliferation of SpyNote in open directories is a call to action for enhanced vigilance and proactive threat hunting.

By leveraging platforms like Hunt, users and organizations can access real-time data on malware families, track their infrastructure, and mitigate risks effectively.

As these threats continue to evolve, staying informed and adopting advanced cybersecurity tools is crucial to safeguarding digital environments from the insidious reach of spyware like SpyNote.

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates


Source link