New Android spyware is targeting Russian military personnel on the front lines
Briefly

A new Android malware specifically targets Russian military personnel, disguised as the legitimate Alpine Quest mapping app. Known as Android.Spy.1292.origin, the malware is distributed via Telegram and unofficial app repositories, masquerading as a free version of Alpine Quest Pro. Research by Dr.Web reveals that this trojan collects sensitive data, including phone numbers, contacts, and geolocation. With modular capabilities, the malware can adapt and steal further files of interest, particularly targeting documents shared through messaging platforms like Telegram and WhatsApp, making it a significant risk in war zones.
The trojanized Alpine Quest app targets Russian military personnel by secretly harvesting contacts and tracking their location, while appearing as a legitimate mapping tool.
Researchers discovered Android.Spy.1292.origin, malware hidden in a modified Alpine Quest app, effectively evading detection while stealing sensitive data from users.
Read at Ars Technica
[
|
]