11,000 Android Devices Compromised by Chinese Threat Actors to Deploy PlayPraetor Malware

A global surge in Android device infections has been traced to PlayPraetor, a sophisticated Remote Access Trojan (RAT) distributed by Chinese-speaking threat actors leveraging a Malware-as-a-Service (MaaS) model.

Investigations by Cleafy Labs reveal that, in under three months, PlayPraetor infected more than 11,000 Android devices worldwide.

The operation’s scalability is powered by a Chinese-language Command and Control (C2) panel, designed with a multi-tenant architecture that enables multiple affiliates to independently manage campaigns and victim pools.

PlayPraetor Misclassified as SpyNote

This model supports aggressive expansion, with over 2,000 new infections occurring weekly—driven by automated tools that allow attackers to rapidly create convincing, malicious app download pages mimicking legitimate Google Play Store sites.

The approach has drastically lowered barriers for cybercriminals, allowing even those with limited expertise to orchestrate complex fraud operations on a global scale.

Device Remote Control Section

Targeted Expansion: Europe & Hotspots at Risk

Analysis of the botnet’s C2 infrastructure and infection data reveals a calculated strategy, rather than indiscriminate spread.

Europe is currently the epicenter, accounting for 58% of infections, with high concentrations in Portugal, Spain, and France.

Other hotspots include Morocco in Africa, Peru in Latin America, and Hong Kong in Asia. PlayPraetor’s affiliate network is hierarchical, dominated by two principal operators who control nearly 60% of active infections, especially among Portuguese-speaking targets.

C2 Dashboard with real-time infection statistics

However, recent weeks have seen a pronounced shift in focus: infections among Portuguese speakers are flattening, while incidents targeting Spanish and French-speaking users have dramatically increased.

The skew is evidenced by the botnet’s weekly surge of new infections in Spanish- and French-speaking regions, signaling a strategic pivot and an escalating risk to financial institutions and their customers in these markets.

  • Europe accounts for 58% of all PlayPraetor infections, with Portugal, Spain, and France most heavily targeted.
  • Morocco has become a hotspot in Africa, with Peru and Hong Kong also seeing significant infection rates.
  • Two main affiliates control almost 60% of active infections, focused heavily on Portuguese-speaking victims.
  • Recent weeks show rapid growth in infections among Spanish- and French-speaking users, marking a major shift in targeting.
  • This evolution poses a rapidly increasing risk to banks and financial customers across these emerging regions.

Tech Sophistication: Device Takeover to Rapid Campaigns

PlayPraetor’s strength lies not only in scale but its advanced capabilities. The RAT abuses Android’s Accessibility Services to gain real-time control over compromised devices—enabling attackers to perform fraudulent transactions, harvest credentials, intercept SMS, and capture screenshots.

Its communication utilizes multiple protocols: resilient HTTP/HTTPS for initial contact, WebSocket for immediate operator commands, and RTMP for live screen streaming of victims’ devices.

Its campaign is marked by relentless innovation: the malware’s command set was recently streamlined, with legacy functions pruned while new capabilities—such as expanded device control and streamlined campaign creation—were introduced.

Central to this crimeware is the C2 panel, written in Chinese and built to empower affiliates with everything needed for orchestrating fraud, including on-demand generation of phishing pages that convincingly impersonate trusted brands.

This aligns with a broader trend in recent financial malware, exemplified by overlapping campaigns like ToxicPanda and SuperCard X, both orchestrated by Chinese-speaking actors and targeting banking institutions across continents.

Infected Device List (Affiliate View)

PlayPraetor marks a significant escalation in Android banking threats, combining an adaptive, multi-affiliate infrastructure with technical sophistication and aggressive expansion.

Its relentless innovation and modular tactics exemplify the threat posed to global financial systems by the modern cybercriminal ecosystem.

Indicators of Compromise (IOCs)

Malware Sample HashApp Name
1b022ac761a077f0116bb427b6cf8315a86aa654ae0cd55a6616647bbeb769c4Nielsen
d392372928571662e4e59b0e3ff52a0e39a8f062633a4f5bdafc681bcdcdcf22Google Chrome
C2 InfrastructureDescription
mskisdakw[.]topBot Communications Domain
fsdlaowaa[.]topBot Communications Domain
199.247.6[.]61Bot Communications IP
Delivery Page Domain
djp[.]center
kmyjh[.]top

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here