31 August 2023

Chinese Gref APT targets Android users via fake Signal and Telegram apps


Chinese Gref APT targets Android users via fake Signal and Telegram apps

A cyberespionage campaign is distributing spyware via trojanized Signal and Telegram apps on Google Play and Samsung Galaxy stores, ESET researchers revealed.

The campaign believed to be orchestrated by a China-linked threat actor known as Gref, has been ongoing since July 2023 and involves a sophisticated espionage tool named BadBazaar, which targets Android users via fake versions of popular communication apps Signal and Telegram called Signal Plus Messenger and FlyGram.

The BadBazaar malware has previously been used to target Uyghurs and other Turkic ethnic minorities.

The purpose of these malicious apps is to exfiltrate data from infected Android devices. FlyGram can steal basic device information and sensitive data, such as contact lists, call logs, and the list of Google Accounts. Though it is also able to extract some information and settings related to Telegram, this data doesn’t include the Telegram contact list, messages, or any other sensitive information.

Signal Plus Messenger collects similar device data and sensitive information but its main goal is to spy on the victim’s Signal communications. The app is capable of exfiltrating the Signal PIN that protects the Signal account and misuses the link device feature that allows users to link Signal Desktop and Signal iPad to their phones.

The observed attackers utilized SSL pinning to protect the communication between the malicious apps and their command-and-control servers, making interception and analysis challenging for researchers.

Infections were primarily detected in Australia, Brazil, Denmark, the Democratic Republic of the Congo, Germany, Hong Kong, Hungary, Lithuania, the Netherlands, Poland, Portugal, Singapore, Spain, Ukraine, the United States, and Yemen.

ESET says it reported both apps to Google and Samsung. Google removed the offending software from the Play Store, however, both apps are still available on the Samsung Galaxy Store.


Back to the list

Latest Posts

Cyber Security Week in Review: December 20, 2024

Cyber Security Week in Review: December 20, 2024

In brief: A suspected Russian cyberattack hits Ukraine's state registries, new ICS malware targets Mitsubishi and Siemens systems, and more.
20 December 2024
Major phishing campaign abuses HubSpot to steal credentials from European firms

Major phishing campaign abuses HubSpot to steal credentials from European firms

The attackers exploited the service’s legitimate functionality to create convincing phishing pages.
19 December 2024
UAC-0125 malware campaign targeting Ukrainian military personnel

UAC-0125 malware campaign targeting Ukrainian military personnel

Victims are lured to fraudulent websites offering to download a malicious version of the Army+ app.
19 December 2024