31 August 2023

Chinese Gref APT targets Android users via fake Signal and Telegram apps


Chinese Gref APT targets Android users via fake Signal and Telegram apps

A cyberespionage campaign is distributing spyware via trojanized Signal and Telegram apps on Google Play and Samsung Galaxy stores, ESET researchers revealed.

The campaign believed to be orchestrated by a China-linked threat actor known as Gref, has been ongoing since July 2023 and involves a sophisticated espionage tool named BadBazaar, which targets Android users via fake versions of popular communication apps Signal and Telegram called Signal Plus Messenger and FlyGram.

The BadBazaar malware has previously been used to target Uyghurs and other Turkic ethnic minorities.

The purpose of these malicious apps is to exfiltrate data from infected Android devices. FlyGram can steal basic device information and sensitive data, such as contact lists, call logs, and the list of Google Accounts. Though it is also able to extract some information and settings related to Telegram, this data doesn’t include the Telegram contact list, messages, or any other sensitive information.

Signal Plus Messenger collects similar device data and sensitive information but its main goal is to spy on the victim’s Signal communications. The app is capable of exfiltrating the Signal PIN that protects the Signal account and misuses the link device feature that allows users to link Signal Desktop and Signal iPad to their phones.

The observed attackers utilized SSL pinning to protect the communication between the malicious apps and their command-and-control servers, making interception and analysis challenging for researchers.

Infections were primarily detected in Australia, Brazil, Denmark, the Democratic Republic of the Congo, Germany, Hong Kong, Hungary, Lithuania, the Netherlands, Poland, Portugal, Singapore, Spain, Ukraine, the United States, and Yemen.

ESET says it reported both apps to Google and Samsung. Google removed the offending software from the Play Store, however, both apps are still available on the Samsung Galaxy Store.


Back to the list

Latest Posts

Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024
US seizes 32 domains linked to Russian Doppelganger influence campaign

US seizes 32 domains linked to Russian Doppelganger influence campaign

The domains, used to disseminate propaganda, were seized as part of a broader effort to disrupt Russia’s attempts to interfere in the 2024 US Presidential Election.
5 September 2024