Data Thieves Disguise as Romantic Apps to Swipe Sensitive Information
In a recent development, mobile security researchers have uncovered a large-scale malware campaign that targets users through fake dating and social networking apps. Dubbed as the SarangTrap operation, this malicious activity remains active and continues to evolve, making vigilance more critical than ever.
The operation, named 'SarangTrap', spans both Android and iOS platforms. Users are prompted to enter a code that triggers hidden spyware routines, allowing the malware to access and extract a wide range of personal data, including contacts, private images, SMS content, and device identifiers.
The apps mimic legitimate services but are designed solely to siphon user data. At least 25 of these malicious domains have been indexed by search engines like Google, ranking for common keywords such as dating, file sharing, and social networking.
One reported case involved a man grieving a breakup who was targeted via a fake dating profile and had his device compromised after downloading an app from a phishing link and entering a code. In newer Android samples, developers have removed SMS permissions from the manifest file while retaining the code for message exfiltration, suggesting ongoing experimentation to bypass security scans while maintaining spyware functions.
For iOS users, the campaign uses malicious mobile configuration profiles instead of traditional app installations. Over 250 malicious apps and more than 80 phishing domains have been used in the campaign.
Zimperium, a mobile security company, has warned users to be cautious of apps demanding invitation codes or unusual permissions, avoid third-party app stores, and regularly review installed profiles and security settings. The threat actors behind SarangTrap are believed to be North Korean state-sponsored cyber actors targeting South Korean military and government entities.
Attackers using the SarangTrap malware have been known to use stolen content to blackmail users, threatening to expose personal videos to their families. The malware uses emotionally manipulative tactics, such as fake profiles, exclusive 'invitation codes', and convincing app interfaces.
After the app gains access, it silently transmits sensitive data to an attacker-controlled server. The SarangTrap operation is a reminder for users to remain vigilant and to exercise caution when downloading apps, especially those that demand unusual permissions or request for invitation codes.
Read also:
- Unveiling the Less-Discussed Disadvantages of Buds - Revealing the Silent Story
- Upcoming Amazon Hardware Event 2025: Anticipated Announcements
- BMW Suffers Ransomware Attack by Everest Group, with Reports of Stolen Internal Documents
- MI6 intelligence agency in the UK intends to expand recruitment efforts into the dark web, particularly focusing on potential candidates within Russia.