Cyber Security News

New Android Malware Mimics Chat App to Steal Sensitive Data

A sophisticated Android malware campaign targeting users in South Asia, particularly in the Kashmir region of India has been recently uncovered by the cybersecurity researchers at Cyfirma.

The malware, disguised as a chat application called “Tanzeem,” is attributed to the notorious APT group known as ‘DONOT,’ which is believed to serve Indian national interests.

Landing page of the app (Source – Cyfirma)

The malicious app, discovered by CYFIRMA’s research team, poses as a legitimate chat platform but ceases to function once installed.

Fake chat page (Source – Cyfirma)

Instead, it requests extensive permissions to access sensitive user data and device functions. Two nearly identical samples were collected in October and December 2024, indicating an ongoing campaign.

“Tanzeem,” which translates to “organization” in Urdu, is a term often associated with terrorist groups and law enforcement agencies in the region.

Analysts at Cyfirma noted that this naming suggests the malware is designed to target specific individuals or groups both within and outside India.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Technical Analysis

The malware leverages OneSignal, a popular customer engagement platform, in an unprecedented way for this APT group.

Researchers believe the attackers are misusing OneSignal to deliver phishing links through push notifications, enhancing the malware’s persistence on infected devices.

Technical analysis reveals that the malware requests dangerous permissions, including access to call logs, contacts, SMS messages, file storage, and precise location data.

Pop up after clicking on ‘start chat’ and Accessibility setting once clicked on ‘ok’ on the pop-up (Source – Cyfirma)

It also seeks permission to extract emails and usernames used for logging into various internet platforms.

The malware employs sophisticated evasion techniques, including obfuscation to hide malicious code within the APK. It can enumerate files and directories, capture keystrokes, collect system information, and even record the device’s screen.

CYFIRMA researchers identified several indicators of compromise, including the SHA-256 hash 8689D59AAC223219E0FDB7886BE289A9536817EB6711089B5DD099A1E580F8E4 for the malware file. Command and control domains such as toolgpt[.]buzz and updash[.]info were also uncovered.

Diamond Model (Source – Cyfirma)

The DONOT APT group has a history of targeting government and military organizations in South Asia. This latest campaign demonstrates their evolving tactics and persistent focus on the region.

Cybersecurity experts warn that the group is likely to continue refining their methods to maintain persistence in future attacks.

Users are advised to exercise caution when installing new apps, especially those requesting extensive permissions.

Besides this, the organizations in the targeted regions are also advised to remain vigilant and implement robust security measures to protect against this evolving threat.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Tushar Subhra Dutta

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…

2 hours ago

How Healthcare Providers Investigate And Prevent Cyber Attacks: Real-world Examples

According to IBM Security annual research, "Cost of a Data Breach Report 2024", an average…

3 hours ago

NVIDIA Riva Vulnerabilities Exposes Enable Authorized Access to Cloud Environments

A critical security flaw in NVIDIA's Riva framework, an AI-powered speech and translation service, has…

4 hours ago

CISA Adds Broadcom Brocade Fabric OS Vulnerability to Known Exploited Vulnerabilities Catalog

CISA officially added a significant security flaw affecting Broadcom’s Brocade Fabric OS to its authoritative…

4 hours ago

AirPlay Zero-Click RCE Vulnerability Enables Remote Device Takeover via Wi-Fi

A critical vulnerability in Apple’s AirPlay protocol, dubbed AirBorne, has exposed over 2.35 billion active…

4 hours ago

Google Chrome Vulnerability Let Attackers Escape Payload from Sandbox – Technical Details Disclosed

A critical vulnerability in Google Chrome has recently been discovered that allows malicious actors to…

5 hours ago