A sophisticated Android malware campaign named "SpyLend" has infiltrated the Google Play Store, posing as a financial utility app called "Finance Simplified" (package: com.someca.count), targeting Indian users. Launched in February 2025, it has over 100,000 downloads. The app initially appears as a finance calculator but changes its interface based on user geolocation. For Indian users, it loads content from adv[.]rp5[.]org, redirecting them to unauthorized loan applications and external servers to download malicious APKs.
SpyLend requests invasive permissions under the guise of identity verification, leading to harassment and blackmail of users. It exploits Android’s WebView API and a custom command-and-control (C2) server to retrieve loan application listings and exfiltrate device metadata. The malware captures clipboard data every three seconds, allowing it to steal sensitive information such as passwords and credit card details.
The C2 infrastructure, located at 16[.]163[.]9[.]142, collects stolen SMS messages, call logs, and app lists, with evidence suggesting involvement of Chinese threat actors. Despite Google Play Protect, SpyLend can evade detection through real-time payload updates. Users are advised to review app permissions and avoid third-party APKs, while enterprises are encouraged to implement endpoint detection tools and blacklist certain indicators of compromise.