Hackers Mimic Google Chrome Install Page on Google Play to Deliver Android Malware

Cybersecurity researchers have uncovered a new wave of deceptive websites hosted on newly registered domains, delivering a potent Android remote access trojan (RAT) known as SpyNote.

These malicious websites mimic the Google Chrome installation page on the Google Play Store to lure victims into downloading the malware.

SpyNote, renowned for its extensive surveillance capabilities, data exfiltration, and remote control functionality, poses a significant threat to users and organizations alike.

Analysis of these campaigns has identified common patterns in domain registration and website structure, suggesting sophisticated and organized efforts.

Domains registered via NameSilo, LLC and XinNet Technology Corporation were frequently observed hosting these sites, with hosting services provided by Lightnode Limited and Vultr Holdings LLC.

The websites use servers running the nginx software and rely on SSL certificates from R10 and R11 issuers to enhance the illusion of legitimacy.

These sites often resolve to the IP address 156.244.19[.]63, with notable endpoint paths such as /index/index/download.html.

Deceptive Website Design and Malware Delivery Mechanism

The fraudulent websites include an image carousel that displays screenshots of mimicked app pages to resemble legitimate Google Play Store listings.

These images are fetched from another suspicious domain, “bafanglaicai888[.]top,” believed to be managed by the same threat actor.

The presence of comments in both English and Chinese within the site code and malware files strongly suggests a China-related nexus behind the operation.

Android Malware
Chinese-language comments

A key element of the websites is their interactive “Install” button, configured using “ components.

When clicked, this button executes a JavaScript function named “download()” to initiate the automated download of a malicious .apk file from a hardcoded URL.

According to the Report, this function exploits hidden iframes to trigger the download process seamlessly.

In one analyzed instance, the URL “https[:]//www.kmyjh[.]top/002.apk” was used to deliver SpyNote dropper malware.

Upon execution, the initial .apk file installs a second embedded .apk file through a class function called InstallDropSessionActivity().

Android Malware
dropper installs a second .apk file

This second .apk file contains the core functionality of the SpyNote malware. Additionally, a base.dex file within the malware’s assets directory stores connection parameters and facilitates communication with the Command and Control (C2) server.

Some configurations were noted to include a hardcoded IP and port 8282 to establish remote connections to the C2 infrastructure.

SpyNote’s Capabilities and Ramifications

SpyNote malware is infamous for its persistence, often necessitating a factory reset for complete removal.

Once deployed on a compromised device, it aggressively seeks intrusive permissions, granting it extensive control over the victim’s device and sensitive information.

With its advanced surveillance features, SpyNote can steal SMS messages, contact lists, call logs, and files while tracking the victim’s location in real time.

The trojan also enables remote access capabilities, allowing threat actors to activate the device’s camera or microphone, manipulate calls, execute arbitrary commands, and remotely install applications.

Its keylogging functionality is highly concerning as it targets application credentials and exploits Accessibility Services to intercept two-factor authentication codes.

SpyNote’s ability to remotely wipe data, lock devices, and conduct additional malicious activity further elevates the threat it poses.

While no definitive attribution has been made, the technical analysis points to a Chinese nexus behind these campaigns.

SpyNote and its variant SpyMax have historically been linked to advanced persistent threat (APT) groups such as OilRig (APT34), APT-C-37 (Pat-Bear), and OilAlpha, highlighting their use in espionage against entities like Indian defense personnel.

The widespread availability of the SpyNote builder tool in underground forums has enabled both cybercriminals and sophisticated threat actors to adopt and customize this malware.

The discovery of newly registered domains hosting deceptive websites replicating Google Play Store pages underscores the rising sophistication of Android malware distribution campaigns.

SpyNote’s robust capabilities, combined with its aggressive tactics for device exploitation, highlight the critical need for enhanced cybersecurity measures and awareness among users.

As attackers continue leveraging social engineering techniques, digital vigilance remains paramount to mitigating the risks posed by such potent malware.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here