Fake Antivirus App Delivers LunaSpy Malware to Android Devices

A sophisticated cybercrime campaign has emerged, specifically targeting Android users through counterfeit antivirus applications that stealthily install LunaSpy spyware onto victims’ devices. Security researchers have flagged this malicious operation as an ongoing threat, exploiting users’ security concerns to gain unauthorized access to personal data and device functionalities.

The LunaSpy malware campaign has been active since at least February 2025, primarily disseminating through popular messaging applications. Cybercriminals utilize social engineering tactics, distributing the malicious software under the guise of legitimate antivirus and banking protection tools. Victims often receive messages from unknown contacts or compromised accounts within their own contact lists, featuring straightforward instructions such as “Hi, install this program here,” accompanied by enticing download links.

Additionally, the malware spreads through newly created Telegram channels that pose as legitimate software distribution platforms. These channels frequently appear, easily deceiving users who are in search of security solutions for their mobile devices. The attackers cleverly capitalize on users’ fears of malware infections, prompting them to install any application that promises comprehensive protection.

Deceptive Installation Process

Upon installation, the counterfeit antivirus application mimics the behavior of legitimate security software convincingly. The malicious app performs mock device scans, presenting users with alarming reports that indicate numerous threats detected on their smartphones. These fabricated results are strategically designed to frighten users into granting extensive permissions to the application, ostensibly to enable it to eliminate the non-existent threats and safeguard the device.

This deceptive approach effectively manipulates victims into willingly providing the malware with access to all personal data stored on their devices, including sensitive information such as passwords, messages, and financial details. The latest iterations of LunaSpy showcase increasingly sophisticated capabilities that facilitate comprehensive surveillance of infected devices.

The malware is capable of stealing passwords from both web browsers and messaging applications, underscoring the necessity of utilizing dedicated password management tools for enhanced security. LunaSpy’s surveillance toolkit includes the ability to record audio and video via device microphones and cameras, access text messages and call logs, read contact lists, and execute arbitrary shell commands. Furthermore, the spyware tracks users’ geographical locations and can capture screen activity in real-time.

Researchers have also uncovered dormant code within the malware designed to pilfer photos from device galleries, although this functionality has not yet been activated in current campaigns. All collected information is transmitted to the attackers through an extensive network of approximately 150 different domains and IP addresses serving as command-and-control servers.

To safeguard themselves, users are advised to avoid software installations from unofficial sources, meticulously scrutinize unexpected download requests, and employ reputable security solutions from established vendors. Regular security awareness and cautious online behavior remain the most effective defenses against such sophisticated social engineering attacks.

The Ultimate SOC-as-a-Service Pricing Guide for 2025Download for Free

AppWizard
Fake Antivirus App Delivers LunaSpy Malware to Android Devices