Researchers uncover spyware targeting messaging app users in the UAE
read file error: read notes: is a directory 2025-10-2 09:15:56 Author: therecord.media(查看原文) 阅读量:17 收藏

Researchers have discovered new spyware embedded in fake messaging apps being used to target people in the United Arab Emirates.

The cybersecurity firm ESET said Thursday its experts found two Android spyware campaigns, dubbed ProSpy and ToSpy, which pose as Signal and ToTok — a free messaging and calling app that originated in the UAE. 

The spyware is installed through fake websites and app stores, and it allows sensitive data files, contacts, chat backups and media to be stolen. 

It also reloads the authentic apps in order to make itself look legitimate, ESET said in a blog post.

The detections in the UAE and the use of phishing and fake app stores to carry out the attacks suggest “regionally focused operations with strategic delivery mechanisms,” ESET said in a press release. Once installed, both types of spyware are persistent.

Command-and-control servers discovered by the researchers suggest the ToSpy campaign is ongoing.

The apps containing the spyware can only be installed manually via third-party websites, according to ESET researcher Lukáš Štefanko. One of the websites pushing ToSpy malware posed as the Samsung Galaxy Store, he said. 

ESET detected the ToSpy malware in June and believes it dates back to 2022. Researchers found four “deceptive distribution websites” posing as the app.

The ProSpy campaign was also detected by researchers in June and is believed to have begun in 2024. 

The fake websites distributing ProSpy use malicious Android Application Packages (APK) “posing as improvements,” ESET said. 

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.


文章来源: https://therecord.media/researchers-spyware-uae-infections
如有侵权请联系:admin#unsafe.sh