A carefully managed hacking and espionage campaign is infecting smartphones with a potent forms of Android malware, providing those behind it with total control of the device, while also remaining completely hidden from the user.
Mandrake spyware abuses legitimate Android functions to help gain access to everything on the compromised device in attacks which can gather almost any information about the user.
The attacker can browse and collect all data on the device, steal account credentials for accounts including banking applications. secretly take recordings of activity on the screen, track the GPS location of the user and more, all while continuously covering their tracks.
The full capabilities of Mandrake – which has been observed targeting users across Europe and the Americas – detailed in a paper by cybersecurity researchers at Bitdefender. Mandrake has been active since 2016 and researchers previously detailed how the spyware operation was specifically targeting Australian users – but now it’s targeting victims around the world.
“The ultimate goal of Mandrake is complete control of the device, as well as account compromise. This is one of the most potent pieces of Android malware we have seen until now,” Bogdan Botezatu Director of Threat Research and Reporting at Bitdefender told ZDNet.
It isn’t clear how exactly widespread the campaigns are, but the malware isn’t spammed out like other campaigns – the attackers appear to carefully pick their victims and once they have a valued target compromise, they’ll manually control the actions of Mandrake in order to manipulate the most information out of the user as possible.
“We estimate the number of victims in the tens of thousands for the current wave, and probably hundreds of thousands throughout the full four-year period,” the company said.
And when the attackers have gained all the information they want from the victim Mandrake has a kill-switch which wipes the malware from the device.
Mandrake’s operators have put serious effort into making sure it has stayed hidden over the years, even going so far as to develop, upload and maintain several applications onto the Google Play Store – under the names of several different developers. Some of these were even designed to target specific countries. The apps have now been removed.
In order to keep users happy the apps were mostly ad free and fixes were regularly delivered. Some of the apps even had social media pages – all designed to convince users to download and trust the them.
The malware avoids detection by Google Play by using a multi-stage process to hide the payload. The app is installed on the phone and it then contacts the server to download a loader, which then provides the additional capabilities Mandrake needs to take control of the device.
“The malware operates in stages, with the first stage being a benign app with no malicious behaviour, other than the ability to download and install a second-stage payload when expressly directed to do so. It is safe to say that its operator won’t trigger this malicious behaviour while running in Google’s analysis environment,” Botezatu explained.
The malware tricks the user into provide it with additional privileges on the device.
“What seems to be a simple process such as going through an End-User License Agreement and accepting it is actually translated behind the scenes into requesting and granting extremely powerful permissions. With those permissions, the malware gets complete control of the device and data on it.” said Botezatu.
While it’s still uncertain as to who is exactly targeted by Mandrake and why, the attackers are aware that if they push the boat out too far, their campaign will be more likely to be discovered.
While it can’t be certain who exactly runs the cyber criminal operation behind Mandrake, the malware will specifically avoid running on devices in former Soviet Union countries, Africa and the Middle East. Researchers note that some of the first countries made exempt from Mandrake attacks were Ukraine, Belarus, Kyrgyzstan and Uzbekistan.
ZDNet has contacted Google for comment but hasn’t received a response at the time of writing.
The Mandrake campaign is likely to still be operating and it’s probably only a matter of time before those behind it attempt to distribute new applications to drop the malware.
To help avoid falling victim to such a campaign, users should be sure they trust and know the company which has developed the application – sometimes it might be better to avoid downloading apps from new sources, even if they’re in the official download store.
READ MORE ON CYBERSECURITY
- This Android ransomware claims to hit you with a fine from the FBI, and that’s not the only threat it delivers
- Fake coronavirus tracking apps are really malware that stalks you CNET
- Now this Android spyware poses as a privacy tool to trick you into downloading
- Almost half of mobile malware are hidden apps [TechRepublic]
- This is how malicious Android apps avoid Google’s security vetting