Introduction

A recent resurgence of an Android malware campaign has been identified, leveraging deceptive websites to distribute SpyNote, a potent remote access Trojan (RAT) active since 2016. These sites mimic legitimate app pages to deceive users into downloading malicious software.

Description

A newly observed Android malware campaign has resurfaced [1] [3], utilizing deceptive websites hosted on recently registered domains to distribute SpyNote [1] [3], a powerful remote access Trojan (RAT) that has been active since 2016. These fraudulent sites replicate legitimate Google Play Store app pages [1] [3], employing familiar web designs and misleading visuals [4], including image carousels with screenshots of purported app pages and fake “Install” buttons [3], to trick users into downloading malicious APK files [2]. One notable instance involved a site that closely mimicked the TikTok installation page, containing remnants of older app references in its code [2].

When users interact with the mimicked installation button [1] [3], it executes a hidden JavaScript function that automatically triggers the download of a dropper APK. This initial dropper installs a secondary payload that contains the core functionality of SpyNote [2] [5], enabling extensive operations such as intercepting text messages, call logs [2] [4] [5], and contacts; remotely activating the camera and microphone; logging keystrokes; tracking GPS location; recording phone calls; and downloading and installing additional apps [5].

SpyNote operates with a two-stage architecture [4], where the base DEX file in the assets folder manages command-and-control (C2) connectivity [4]. It communicates with C2 servers using hardcoded IP addresses and ports [1] [3], with the C2 parameters embedded in the malware’s DEX file [1] [3], allowing for both dynamic and hardcoded connections [1] [3]. Analysis indicates that many domains distributing SpyNote are registered with NameSilo LLC and XinNet Technology Corp. [2], and are hosted on infrastructure linked to Lightnode Ltd and Vultr Holdings LLC. [2] The deployment of these malicious sites appears systematic and automated [2], likely executed by a threat actor with access to malware-as-a-service tools [2]. The presence of code and comments in both English and Chinese suggests involvement from a Chinese-speaking threat actor [2], although definitive attribution remains speculative [2]. SpyNote has been associated with advanced persistent threat groups such as OilRig (APT34) and APT-C-37 (Pat-Bear) [2], which have historically targeted individuals in South Asia [2], including Indian defense personnel [2].

Once installed, SpyNote requests extensive permissions [2] [4], including access to SMS [2], contacts [2] [4] [5], call logs [2] [4] [5], camera [2] [5], microphone [2] [4] [5], and location services [2]. Its capabilities encompass real-time device tracking [4], microphone/audio recording [4], stealing two-factor authentication codes, taking remote photos or videos [4], credential theft through overlay injections [4], silent app installations [2] [4], and preventing uninstallation by abusing accessibility features [2]. Its persistence mechanisms allow it to automatically relaunch after a device reboot [2], hide its app icon [2] [5], and evade battery optimization [2] [5], making removal particularly challenging [2]. The only reliable method for complete removal of SpyNote is often a factory reset [5], as noted by cybersecurity experts. Mobile users and enterprise security teams are advised to remain cautious of spoofed app pages and to refrain from sideloading APKs from untrusted sources [2]. Additionally, users are encouraged to download apps exclusively from Google Play [4], review app permissions post-installation [4], and ensure Play Protect is active on their devices [4].

Conclusion

The resurgence of the SpyNote malware campaign underscores the persistent threat posed by sophisticated cyber actors. The campaign’s use of deceptive websites to distribute malware highlights the need for heightened vigilance among mobile users and security teams. To mitigate risks [4], users should avoid sideloading apps from untrusted sources, regularly review app permissions [4], and ensure security features like Play Protect are enabled. As cyber threats continue to evolve, staying informed and adopting robust security practices remain crucial in safeguarding against such malicious activities.

References

[1] https://www.infosecurity-magazine.com/news/spynote-malware-targets-android/
[2] https://siliconangle.com/2025/04/10/spynote-android-malware-resurfaces-campaign-using-spoofed-app-install-pages/
[3] https://ciso2ciso.com/spynote-malware-targets-android-users-with-fake-google-play-pages-source-www-infosecurity-magazine-com/
[4] https://cyberinsider.com/new-spynote-android-malware-campaign-mimics-google-play-to-deliver-stealthy-rat/
[5] https://www.tomsguide.com/computing/malware-adware/hackers-are-using-fake-google-play-store-pages-to-infect-android-phones-with-a-dangerous-trojan-how-to-stay-safe