Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Astronomer CEO resigns following Cold Play Concert Scandal

David Sacks and a blurred line of government services

Windsurf CEO opens about a “very dark” mood before recognition

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » PJOBRAT malware campaign targets Taiwanese users via fake chat apps
Identity

PJOBRAT malware campaign targets Taiwanese users via fake chat apps

userBy userMarch 28, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 28, 2025Ravi LakshmananSpyware/Malware

PJOBRAT Malware

The previously observed family of Android malware targeting Indian military personnel is linked to a new campaign targeting Taiwanese users under the guise of chat apps.

“PJOBRAT can steal SMS messages, phone contacts, device and app information, documents and media files from infected Android devices,” Sophos security researcher Pankaj Kohli said in an analysis Thursday.

First documented in 2021, PJOBRAT has a track record of being used against military-related targets in India. Subsequent iterations of malware are pretended to be dating and instant messaging apps to deceive future victims. It is known to be active since at least the second half of 2019.

In November 2021, Meta was thought to be considered a subcluster within the transparent tribe called threat actors alongside Pakistan, resulting from the use of PJOBRAT and Mayhem as part of a highly targeted attack directed at Afghanistan, particularly those with governments and military groups, especially those in governments and law groups.

Cybersecurity

“The group created fictional personas (usually young women) as romantic lures to build trust with potential targets and click on phishing links and download malicious chat applications,” Meta said at the time.

PJOBRAT is equipped with device metadata, contact lists, text messages, call logs, location information, and media files on your device or connected external storage. You can also abuse the permissions of the Accessibility Service to scrape content onto your device’s screen.

Telemetry data collected by Sophos shows that the latest campaign trained vision for Android users in Taiwan to activate infection sequences using malicious chat apps called Sangaallite and CCHAT. These are said to be available for download from multiple WordPress sites, with the earliest artifacts dating back to January 2023.

PJOBRAT Malware

According to the cybersecurity company, the campaign ended or at least paused around October 2024. However, the number of infectious diseases was relatively small, suggesting a target for activity. The names of Android package names are listed below –

org.complexy.hard com.happyho.app sa.aangal.lite net.over.simple

Currently, it is not known that victims were deceived by visiting these sites, but if the previous campaign is any indication, there could be a social engineering element. Once installed, the app collects data and requests intrusion permissions that allow it to run uninterruptedly in the background.

“The app has built-in basic chat functionality so users can register, log in and chat with other users (in theory, if infected users knew each other’s user IDs, they could have sent messages to each other). “They also check the Command and Control (C2) server for startup updates, allowing threat actors to install malware updates.”

Cybersecurity

Unlike previous versions of PJOBRAT, which have the ability to steal WhatsApp messages, the latest flavors take a different approach by incorporating new features to execute shell commands. This not only makes it more likely that an attacker will suck up WhatsApp chats, but also gives you more powerful control over infected phones.

Another update is about the command and control (C2) mechanism, where the malware uses two different approaches to upload victim data and Firebase Cloud Messaging (FCM) using HTTP to send shell commands to remove information.

“This particular campaign may be over, but it’s a good example of the fact that threat actors often return and retarget after the first campaign, improve malware, adjust their approach, and then strike again,” Kohli said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMahmoud Khalil’s lawyer appears in New Jersey Court over jurisdiction in Columbia activist case
Next Article Deaths rise to 28 in South Korea’s weekly wildfires | Environmental News
user
  • Website

Related Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

July 18, 2025

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Astronomer CEO resigns following Cold Play Concert Scandal

David Sacks and a blurred line of government services

Windsurf CEO opens about a “very dark” mood before recognition

For privacy and security, think carefully before granting AI access to your personal data

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.