Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

As the venture capital landscape changes, this executive focuses on overlooked founders

Hollywood isn’t happy with new Seedance 2.0 video generator

Designer Kate Burton collaborates with IBM and Fiducia AI for NYFW presentation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Android spyware disguised as an Alpine Quest app targets Russian military equipment
Identity

Android spyware disguised as an Alpine Quest app targets Russian military equipment

userBy userApril 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 23, 2025Ravi LakshmananSpyware/Mobile Security

Android spyware

Cybersecurity researchers have revealed that Russian military personnel are targets for a new malicious campaign that distributes Android Spyware in the guise of Alpine Quest Mapping software.

“The attacker will hide this Trojan within the modified alpine est mapping software and distribute it in a variety of ways, including one of the Russian Android app catalogs,” Doctor Web said in its analysis.

The Trojan horse is found to be built into older versions of the software and is propagated as a freely available variant of the Alpine Quest Pro, a highly functional program.

The Russian cybersecurity vendor also observed a malware called Android.spy.1292.origin, saying it was distributed in the form of APK files via fake telegraph channels.

Cybersecurity

Threat Actors first provided a link to download the app to one of the Russian app catalogs via the Telegram Channel, but the Trojanized version was later distributed directly as an APK as an app update.

What is noteworthy about the attack campaign is that Russian soldiers take advantage of the fact that alpine ests are used by russian soldiers in special military operations zones.

Once installed on an Android device, apps with malware look and function similar to the original app, stay undetected for a long time, collecting sensitive data while collecting sensitive data.

Current date and geolocation information for mobile phone numbers and their accounts’ contact lists Saved files, and app version

In addition to sending victim locations every time you change to Telegram Bot, Spyware supports the ability to download and run additional modules that can remove files sent via Telegram and WhatsApp, especially files of interest.

Android spyware

“Android.spy.1292.Origin not only monitors user locations, but also hijacks sensitive files,” Doctor Web said. “In addition, that functionality can be extended via downloading new modules, allowing you to perform a spectrum of malicious tasks.”

To mitigate the risk poses by such threats, we recommend downloading Android apps only from the reliable app market and avoiding downloading paid versions of the software from suspicious sources.

The Russian organization targeted by the new Windows Backdoor

The disclosure reveals that Kaspersky has revealed that various large Russian organisations are being targeted by sophisticated backdoors by decorating them as updates to secure networking software called VIPNET, across government, finance and industrial sectors.

Cybersecurity

“The backdoor targets computers connected to the VIPNET network,” the company said in its preliminary report. “The backdoor was distributed within the LZH archive, which has a structure typical of updating the software product in question.”

Residing in the archive is a malicious executable (“msinfo32.exe”) that acts as a loader of the encrypted payload contained in the file.

“The loader processes the contents of the file to load the backdoor into memory,” says Kaspersky. This backdoor is versatile. It can connect to the C2 server via TCP, allowing an attacker to steal files from an infected computer, launching especially malicious components. ”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEU slaps Meta, Apple fines nearly $800 million Technology News
Next Article Ongoing Manhunt in Kashmir after fatal attack on tourists | Conflict News
user
  • Website

Related Posts

Google collaborates with Russian actor suspect in failed malware attack on Ukrainian organization

February 13, 2026

Google connects China, Iran, Russia, and North Korea to coordinate defense sector cyber operations

February 13, 2026

UAT-9921 Deploys VoidLink malware targeting technology and financial sectors

February 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

As the venture capital landscape changes, this executive focuses on overlooked founders

Hollywood isn’t happy with new Seedance 2.0 video generator

Designer Kate Burton collaborates with IBM and Fiducia AI for NYFW presentation

India doubles state-backed venture capital, approves $1.1 billion fund

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.