malicious app

AppWizard
December 18, 2025
A new Android malware campaign has been launched by the North Korean threat actor Kimsuky, introducing a variant called DocSwap. This malware is distributed via QR codes on phishing websites that impersonate CJ Logistics. Attackers use QR codes and notification pop-ups to lure victims into downloading the malware, which decrypts an embedded APK and activates Remote Access Trojan (RAT) capabilities. The malicious app is disguised as a legitimate application to bypass Android's security measures. Victims are tricked into installing the app through smishing texts or phishing emails that mimic delivery companies. The app downloads an APK named "SecDelivery.apk," which then loads the malware. It requests permissions to access various device functions and registers a service that simulates an OTP authentication screen. The app connects to an attacker-controlled server, allowing execution of commands such as logging keystrokes, capturing audio, and gathering sensitive information. Additionally, two other malicious samples have been identified, disguised as a P2B Airdrop app and a trojanized version of the BYCOM VPN app. The campaign also includes phishing sites mimicking popular South Korean platforms to capture user credentials.
AppWizard
November 5, 2025
Recent investigations have identified a series of malicious Android applications capable of spying on users by extracting messages from platforms like WhatsApp and Signal, and recording conversations without consent. One such app, WaveChat, can capture background audio even when the microphone is not in use. These apps deploy a remote access trojan (RAT) called VajraSpy and are primarily targeting users in India and Pakistan, with only about 1,400 downloads noted. A total of 12 spyware apps were identified, including six available on the Google Play Store. These include Privee Talk, MeetMe*, Let’s Chat, Quick Chat, Rafaqat رفاق, and Chit Chat. Users are advised to be cautious about app permissions and to download applications only from reputable sources. ESET researchers also discovered two spyware apps posing as the Android Signal app, targeting users in the United Arab Emirates. One malicious app exploited the popularity of a Pakistani cricket player, although he is not involved in the malicious activity. The development of these spyware apps is attributed to Patchwork APT.
AppWizard
October 16, 2025
A newly identified attack method called Pixnapping poses a significant threat to Android devices by allowing malicious applications to capture on-screen information from other apps through pixel stealing. This attack affects various applications, including Signal, Google Authenticator, and Venmo. Pixnapping occurs when a user installs a malicious app that uses Android APIs to launch a target application, capturing sensitive information displayed on the screen by exploiting a side channel. The attack utilizes the GPU.zip side-channel vulnerability, prevalent in modern GPUs from manufacturers like AMD, Apple, Arm, Intel, Qualcomm, and Nvidia. Currently, there are no mitigation strategies available for developers against Pixnapping, which can lead to the theft of locally stored secrets, such as two-factor authentication codes. The GPU.zip vulnerability was disclosed in 2023 and remains unaddressed by GPU vendors.
AppWizard
October 15, 2025
Google has acknowledged a significant vulnerability affecting secure applications like Authenticator and Signal, caused by a technique called "Pixnapping." This vulnerability has been exploited on Google Pixel devices and Samsung Galaxy smartphones. It takes advantage of weaknesses in the Android operating system, particularly through the Android Intent system, allowing malicious apps to request sensitive information from targeted apps. The vulnerability enables the extraction of sensitive pixels, which can be accessed via another vulnerability known as GPU.zip. The research team that discovered Pixnapping demonstrated the exploit on multiple Google Pixel models (Pixel 9, Pixel 8, Pixel 7) and a Samsung Galaxy S25. Google was alerted to the issue in February 2025 and released a partial fix in its September security update. However, a workaround for the CVE-2025-48561 vulnerability remains undisclosed and unaddressed in the current update. Google plans to issue an additional patch in the December security update and has stated that there have been no confirmed real-world exploitations of the vulnerability.
Search