Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Shadow’s Wild West

Building the future of battery recycling in Europe

PlayPraetor Android Trojan infects over 11,000 devices via fake Google Play pages and meta ads

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » PlayPraetor Android Trojan infects over 11,000 devices via fake Google Play pages and meta ads
Identity

PlayPraetor Android Trojan infects over 11,000 devices via fake Google Play pages and meta ads

userBy userAugust 4, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have discovered a new Android remote access trojan (rat) called PlayPraetor, which infected more than 11,000 devices, mainly in Portugal, Spain, France, Morocco, Peru, and Hong Kong.

“The rapid growth of botnets, which is currently over 2,000 new infections per week, is driven by an aggressive campaign focused on Spanish and French speakers, indicating a strategic shift from previous victim bases.”

Managed by the Chinese Command and Control (C2) panel, PlayPraetor is a major departure from other Android Trojans in that it can abuse accessibility services to gain remote control and provide fake overlay login screens on nearly 200 bank apps and cryptocurrency wallets in attempts to hijack victim accounts.

PlayPraetor, first documented by CTM360 in March 2025, detailed its operation on thousands of fraudulent Google Play Store download pages to harvest banking qualifications, monitor clipboard activity, and run a massive, interconnected fraud campaign that allows you to monitor keystrokes.

“Links to impersonated playstore pages are distributed through meta ads and SMS messages to effectively reach a wide range of audiences,” the Bahrain-based company said at the time. “These deceptive ads and messages lead users to fraudulent domains that trick users into clicking on links and host malicious APKs.”

Cybersecurity

Rated as a globally tuned operation, PlayPraetor has five different variations that leverage false progressive web apps (PWAS), WebView-based apps (PHISH), Persistent and C2 (Phantom) accessibility services, encouraging code-based phishing and invitations for Trick users.

According to the Italian fraud prevention company, PlayPraetor’s Phantom variant is capable of on-device fraud (ODF), controlled by two major affiliate operators who control about 60% of the botnet (about 4,500 infringing devices) and are dominated by two major affiliate operators working on Portuguese-speaking targets.

“Its core functionality relies on the abuse of Android’s accessibility services to control compromised devices at scale in real time,” Cleafy said. “This allows operators to perform fraudulent actions directly on the victim’s device.”

Image source: CTM360

Once installed, the malware beacons to the C2 server via HTTP/HTTPS and creates a bi-directional channel for issuing commands using WebSocket connections. It also sets up a Real-Time Messaging Protocol (RTMP) connection to start a live video stream of the screen of an infected device.

The evolving nature of supported commands indicates that PlayPraetor is actively developed by operators, enabling comprehensive data theft. In recent weeks, malware distributing attacks have increasingly targeted Spanish and Arabic-speaking victims, indicating a widespread expansion in the provision of Malware as a Service (MAAS) services.

The C2 panel is not only used to actively interact with compromised devices in real time, but also allows for the creation of bespoke malware delivery pages that mimic the Google Play Store on both desktop and mobile devices.

“The success of the campaign is built on a well-established operational methodology and leverages the multi-affiliate MAAS model,” Kleef said. “This structure allows for a wide range of targeted campaigns.”

PlayPraetor is the latest malware derived from Chinese-speaking threat actors that aim to engage in financial fraud. This is a trend exemplified in the appearance of poison pandas and Super Card X over the past year.

Toxic Pandas evolve

According to Bitsight data, Toxypanda compromised around 3,000 Android devices in Portugal, followed by Spain, Greece, Morocco and Peru. The malware distribution campaign utilizes TAG-1241, a traffic distribution system (TDS) for malware distribution using ClickFix and a fake Google Chrome update lure.

Identity Security Risk Assessment

“This carefully coordinated redirection is part of the design of TDS, which ensures that only selected targets are focused on these malicious endpoints,” security researcher Pedro Fare said in a report last week.

The latest version of Toxicpanda improves its predecessor by incorporating a domain generation algorithm (DGA) to establish C2 and increasing operational resilience in the face of infrastructure takedowns. Also, new commands are burned into the malware to set up a fallback C2 domain and provide better control over malicious overlays.

DoubleTrouble Rises

The findings arise when Zimperium uncovers another refined Android Banking Trojan called Double Trouble. It evolves beyond overlay attacks, records device screens, records keystrokes, and executes various commands for data removal and entrenched device control.

In addition to its strong leaning towards abuse of Android accessibility services and carrying out fraudulent activities, DoubleTrouble’s distribution strategy includes leveraging fake websites that host malware samples directly within the Discord channel.

“New features include stealing pincodes, displaying malicious UI overlays that unlock patterns, comprehensive screen recording capabilities, blocking the opening of certain applications, and advanced keylogging capabilities.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRemove Otter AI from your organization
Next Article Building the future of battery recycling in Europe
user
  • Website

Related Posts

Shadow’s Wild West

August 4, 2025

Remove Otter AI from your organization

August 4, 2025

CL-STA-0969 installs secret malware on telecom networks during 10 months of spying

August 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Shadow’s Wild West

Building the future of battery recycling in Europe

PlayPraetor Android Trojan infects over 11,000 devices via fake Google Play pages and meta ads

Remove Otter AI from your organization

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.