Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

He was appointed as the only finalist for former president of Governor Li Li University in Florida.

Celsius CEO Alex Massky received a 12-year ruling in a crypto fraud case

Affirm (AFRM) Revenue Report Q3 2025

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Android spyware disguised as an Alpine Quest app targets Russian military equipment
Identity

Android spyware disguised as an Alpine Quest app targets Russian military equipment

userBy userApril 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 23, 2025Ravi LakshmananSpyware/Mobile Security

Android spyware

Cybersecurity researchers have revealed that Russian military personnel are targets for a new malicious campaign that distributes Android Spyware in the guise of Alpine Quest Mapping software.

“The attacker will hide this Trojan within the modified alpine est mapping software and distribute it in a variety of ways, including one of the Russian Android app catalogs,” Doctor Web said in its analysis.

The Trojan horse is found to be built into older versions of the software and is propagated as a freely available variant of the Alpine Quest Pro, a highly functional program.

The Russian cybersecurity vendor also observed a malware called Android.spy.1292.origin, saying it was distributed in the form of APK files via fake telegraph channels.

Cybersecurity

Threat Actors first provided a link to download the app to one of the Russian app catalogs via the Telegram Channel, but the Trojanized version was later distributed directly as an APK as an app update.

What is noteworthy about the attack campaign is that Russian soldiers take advantage of the fact that alpine ests are used by russian soldiers in special military operations zones.

Once installed on an Android device, apps with malware look and function similar to the original app, stay undetected for a long time, collecting sensitive data while collecting sensitive data.

Current date and geolocation information for mobile phone numbers and their accounts’ contact lists Saved files, and app version

In addition to sending victim locations every time you change to Telegram Bot, Spyware supports the ability to download and run additional modules that can remove files sent via Telegram and WhatsApp, especially files of interest.

Android spyware

“Android.spy.1292.Origin not only monitors user locations, but also hijacks sensitive files,” Doctor Web said. “In addition, that functionality can be extended via downloading new modules, allowing you to perform a spectrum of malicious tasks.”

To mitigate the risk poses by such threats, we recommend downloading Android apps only from the reliable app market and avoiding downloading paid versions of the software from suspicious sources.

The Russian organization targeted by the new Windows Backdoor

The disclosure reveals that Kaspersky has revealed that various large Russian organisations are being targeted by sophisticated backdoors by decorating them as updates to secure networking software called VIPNET, across government, finance and industrial sectors.

Cybersecurity

“The backdoor targets computers connected to the VIPNET network,” the company said in its preliminary report. “The backdoor was distributed within the LZH archive, which has a structure typical of updating the software product in question.”

Residing in the archive is a malicious executable (“msinfo32.exe”) that acts as a loader of the encrypted payload contained in the file.

“The loader processes the contents of the file to load the backdoor into memory,” says Kaspersky. This backdoor is versatile. It can connect to the C2 server via TCP, allowing an attacker to steal files from an infected computer, launching especially malicious components. ”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEU slaps Meta, Apple fines nearly $800 million Technology News
Next Article Ongoing Manhunt in Kashmir after fatal attack on tourists | Conflict News
user
  • Website

Related Posts

Over 38,000 Freedrain subdomains have been discovered after exploiting SEO to steal crypto wallet seed phrases

May 8, 2025

SONICWALL Patch 3 flaws in SMA 100 devices allow attackers to execute code as root

May 8, 2025

Qilin ransomware ranked best in April 2025 with over 45 data leak disclosures

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

He was appointed as the only finalist for former president of Governor Li Li University in Florida.

Celsius CEO Alex Massky received a 12-year ruling in a crypto fraud case

Affirm (AFRM) Revenue Report Q3 2025

One corner that generates revenue in the energy market is well maintained

Trending Posts

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

May 8, 2025

Key Takeout: Documentary name is Al Jazeera’s Abuakure Murderer | Crime News

May 8, 2025

US attacks first trade deal with the UK with “groundbreaking deal” | International Trade News

May 8, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Health Technology Startup Kouper emerges from $10 million stealth in funding to transform the patient care transition

Did Figma kill Webflow and Framer with the release of the Figma site?

Metaworld Congress 2025: Madrid Takes Center Stage in Digital Innovation

Coinbase wins DeRibit for $2.9 billion and earns a major push to crypto derivatives

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.