Hackers steal Signal, WhatsApp user data with fake Android chat app

Teilen:

Hackers are using a fake Android app named ‘SafeChat’ to infect devices with spyware malware that steals call logs, texts, and GPS locations from phones.

The Android spyware is suspected to be a variant of “Coverlm,” which steals data from communication apps such as Telegram, Signal, WhatsApp, Viber, and Facebook Messenger.

CYFIRMA researchers say the Indian APT hacking group ‘Bahamut’ is behind the campaign, with their latest attacks conducted mainly through spear phishing messages on WhatsApp that send the malicious payloads directly to the victim.

Also, the CYFIRMA’s analysts highlight several TTP similarities to another Indian state-sponsored threat group, the ‘DoNot APT’ (APT-C-35), that has previously infested Google Play with fake chat apps acting as spyware.

Late last year, ESET reported that the Bahamut group was using fake VPN apps for the Android platform that included extensive spyware functions.

In the latest campaign observed by CYFIRMA, Bahamut targets individuals in South Asia.

“Safe Chat” details

While CYFIRMA doesn’t delve into the specifics of the social engineering aspect of the attack, it’s common for victims to be persuaded into installing a chat app under the pretext of transitioning the conversation to a more secure platform.

The analysts report that Safe Chat features a deceiving interface that makes it appear as a real chat app and also takes the victim through a seemingly legitimate user registration process that adds credibility and serves as an excellent cover for the spyware.

Safe Chat's sign up screen
Safe Chat’s sign up screen (CYFIRMA)

One critical step in the infection is the acquisition of permissions to use the Accessibility Services, which are subsequently abused to automatically grant the spyware more permissions.

These additional permissions enable the spyware to access to the victim’s contacts list, SMS, call logs, external device storage, and fetch precise GPS location data from the infected device.

All permissions included in the spyware's manifest file
All permissions included in the spyware’s manifest file (CYFIRMA)

The app also requests the user to approve exclusion from Android’s battery optimization subsystem, which terminates background processes when the user isn’t actively engaging with the app.

“Another snippet from the Android Manifest file shows that the threat actor designed the app to interact with other already installed chat applications,” explains CYFIRMA.

“The interaction will take place using intents, OPEN_DOCUMENT_TREE permission will select specific directories and access apps mentioned in intent.”

Module that monitors other chat apps on the device
Module that monitors other chat apps on the device (CYFIRMA)

A dedicated data exfiltration module transfers information from the device to the attacker’s C2 server through port 2053.

The stolen data is encrypted using another module that supports RSA, ECB, and OAEPPadding. At the same time, the attackers also use a “letsencrypt” certificate to evade any network data interception efforts against them.

CYFIRMA concludes the report by saying that it holds enough evidence to link Bahamut to working on behalf of a specific state government in India.

Also, using the same certificate authority as the DoNot APT group, similar data stealing methodologies, common targeting scope, and the use of Android apps to infect targets all indicate overlap or close collaboration between the two groups.


Update 8/4 – A Google spokesperson has sent BleepingComputer the following comment:

Users are protected by Google Play Protect, which can warn users of identified malicious apps on Android devices.

 

(c) Lawrence Abrams

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
9:23 am, Mai 19, 2025
Wetter-Symbol 13°C
L: 12° | H: 14°
overcast clouds
Luftfeuchtigkeit: 75 %
Druck: 1021 mb
Wind: 6 mph NE
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 5:02 am
Sonnenuntergang: 8:51 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
12° | 14°°C 0 mm 0% 12 mph 78 % 1021 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
10° | 22°°C 0 mm 0% 10 mph 67 % 1022 mb 0 mm/h
Mi. Mai 21 10:00 pm
Wetter-Symbol
13° | 21°°C 0.2 mm 20% 9 mph 64 % 1020 mb 0 mm/h
Do. Mai 22 10:00 pm
Wetter-Symbol
11° | 18°°C 0 mm 0% 11 mph 64 % 1023 mb 0 mm/h
Fr. Mai 23 10:00 pm
Wetter-Symbol
7° | 18°°C 0.7 mm 70% 11 mph 77 % 1023 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
12° | 14°°C 0 mm 0% 8 mph 78 % 1021 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
14° | 18°°C 0 mm 0% 9 mph 67 % 1021 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
17° | 19°°C 0 mm 0% 12 mph 52 % 1020 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
17° | 17°°C 0 mm 0% 10 mph 46 % 1020 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
13° | 13°°C 0 mm 0% 7 mph 61 % 1021 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
10° | 10°°C 0 mm 0% 5 mph 66 % 1022 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
10° | 10°°C 0 mm 0% 6 mph 67 % 1021 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 7 mph 63 % 1022 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,184.95
-0.78%
Ethereum(ETH)
€2,146.82
-4.47%
Fesseln(USDT)
€0.89
0.00%
XRP(XRP)
€2.06
-3.86%
Solana(SOL)
€144.54
-5.29%
USDC(USDC)
€0.89
0.00%
Dogecoin(DOGE)
€0.194272
-2.37%
Shiba Inu(SHIB)
€0.000013
-4.19%
Pepe(PEPE)
€0.000012
-0.56%
Peanut das Eichhörnchen(PNUT)
€0.284971
-9.79%
Nach oben scrollen