Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

“Bitcoin Family” changed its security after the recent cryptocurrency

AB will be released at Binance -Tech Startups

After data is wiped out, Kiranapro co-founders cannot rule out external hacks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » CTM360 reveals Playmasquered Party
Identity

CTM360 reveals Playmasquered Party

userBy userApril 10, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Overview of PlayPraetor’s masquerade party variations

CTM360 has identified a much larger scope of the ongoing Play Praetor campaign. What started with over 6,000 URLs of very specific bank attacks has grown to over 16,000 with multiple variants. The study is ongoing and is expected to be discovered in the next few days.

Just like before, all newly discovered play spoofing mimics a legitimate app list, cheating users to install malicious Android applications and publishing sensitive personal information. Although these cases initially appeared to be in quarantine, further investigation reveals a globally coordinated campaign poses a serious threat to the integrity of the Play Store ecosystem.

The evolution of threats

This report extends previous research with PlayPraetor studies, highlighting the discovery of five newly identified variants. These variations reveal an increase in campaign sophistication in terms of attack technology, distribution channels and social engineering tactics. The continuous evolution of PlayPraetor demonstrates adaptability and sustained targeting of the Android ecosystem.

Variant-specific targeting and regional focus

In addition to the original PlayPraetor banking Trojan, five new variations (fish, rat, PWA, phantom, veil) have been identified. These variations are distributed through fake websites that are very similar to the Google Play Store. Although they share common malicious behavior, each variant exhibits unique characteristics tailored to a particular area and use case. The target areas include the Philippines, India, South Africa and a variety of global markets.

These variants employ a combination of qualification phishing, remote access capabilities, deceptive web app installation, abuse of Android accessibility services, and stealth techniques that hide malicious activities behind legitimate branding.

Attack targets and industry focus

Although each variant has unique features and regional targeting, the common theme of all PlayPraetor samples focuses on the financial sector. The threat actors behind these variations attempt to steal banking qualifications, credit/debit card details, digital wallet access, and in some cases attempt to carry out fraudulent transactions by transferring funds to a Mule account. These monetization strategies demonstrate well-organized operations focused on economic benefits.

Variant overview and detection insights

Five new variants, fish, rat, PWA, phantom and veil, are currently under active investigation. Some variants have checked detection statistics, while others are still being analyzed. A comparison table summarizing these variants, their features, and regional targets is included in the following sections, along with a detailed technical analysis.

Variant Name Features Description Target Industry Detected Cases (approx.) Play PWA PWA Deceptive Progressive Web App Mimics Legal Apps, create shortcuts on the home screen, and install fake PWAs that cause permanent push notifications. A WebView-based app that launches phishing webpages that steal phishing user credentials, tech, financial, gaming, gambling, e-commerce industry 5400+ play plaiter fish webview. Finance, Communications, Fast Food Industry 1400+ PlayPraetor Phantom Stealthy Persistence & Command Running Abuse Android Accessibility Services for Persistent Control. Run quietly, remove data, hide icons, block uninstalls, and pause as a system update. Financial, Gambling, and Technology Industry These variants are currently under investigation to determine their exact identity. PlayPraetor rat remote access Trojan grants attackers full remote control of infected devices, allowing monitoring, data theft and manipulation. Financial Industry PlayTor Veil Regional & Invitation-based phishing uses legitimate branding to disguise yourself, restrict access via invitation codes, impose regional restrictions, avoid detection and increase trust among local users. Financial and Energy Industry

Geographical distribution and targeting patterns

Analysis of CTM360 shows that PlayPraetor variants are globally distributed, but certain strains exhibit a broader outreach strategy than others. In particular, the Phantom-WW variant stands out in its global targeting approach. In this case, threat actors can spoof as a widely recognized application with global appeal, throw wider nets, and increase the likelihood of victim involvement in multiple regions.

Among the variants identified, the PWA variant emerged as the most common and was detected in a wide range of geographical regions. Its reach spans South America, Europe, Oceania, Central Asia, South Asia and parts of the African continent, highlighting its role as the most widespread variant in the PlayPraetor campaign.

Other variants showed more specific regional targeting. The Phish variant was distributed across multiple regions, although slightly less saturated than PWA. In contrast, rat mutants exhibit significant concentrations of activity in South Africa, suggesting a region-specific focus. Similarly, veil variants are observed primarily in the US and in selected African countries, reflecting more targeted deployment strategies.

How to stay safe

To mitigate the risk of collapse of PlayPraetor and similar fraud victims:

coogleg Download apps only from the Google Play Store or Apple App Store

✅ Check app developers and read reviews before installing the application

compention Avoid unnecessary permissions, especially granting accessibility services.

Use mobile mobile security solutions to detect and block malware-infected APKs

Stay up to date on new threats as per Cybersecurity reports

Read the full report to find out what variant behaves, detection insights, and practical recommendations.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDive deep into ai & nhi
Next Article E. coli’s fear, choice spat, Cambridge rule: What you need to know about the famous boat race
user
  • Website

Related Posts

The new Atomic Macos Stealer campaign targets Apple users by exploiting Clickfix

June 6, 2025

Empower users and protect against Genai data loss

June 6, 2025

Microsoft will help CBI to dismantle the Indian call centre behind Japan’s technical assistance scam

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

“Bitcoin Family” changed its security after the recent cryptocurrency

AB will be released at Binance -Tech Startups

After data is wiped out, Kiranapro co-founders cannot rule out external hacks

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

AB will be released at Binance -Tech Startups

Top 10 Startups and Tech Funding News for the Weekly Ends June 6, 2025

Order openai to keep all chatgpt logs including deleted temporary chats, API requests

Omada Health is now available: Virtual Care Startup joins IPO Wave, paying $150 million, $1.1 billion valuation of NASDAQ debut

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.