×
ItalianoEnglish
Set as default language

Grandangolo Communications

  • Home
  • Company
  • Services
    • Public Relation
    • Digital PR
    • Marketing
    • Lead Generation
    • Events
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages
  • Home
  • Customer Press Room
  • Eset
  • ESET: spy apps from the pro-Chinese group GREF pose as Signal and Telegram and attack users in Europe and the United States

Customer Press Room

ESET: spy apps from the pro-Chinese group GREF pose as Signal and Telegram and attack users in Europe and the United States

by Grandangolo Communications / Tuesday, 19 September 2023 / Published in Eset

Thousands of users have downloaded the FlyGram and Signal Plus Messenger spy apps from the Google Play Store and Samsung Galaxy Store. ESET telemetry has reported detections on Android devices in Europe, the US, Ukraine and other parts of the world

Researchers of ESET, a global European leader in the cybersecurity market, have identified two active campaigns targeting Android users of Telegram and Signal, where the threat actors are traced back to the China-aligned APT GREF group. Most likely active since July 2020 and July 2022, for each app respectively, the campaigns distributed the BadBazaar Android spy code through the Google Play Store, Samsung Galaxy Store, and dedicated websites posing as legitimate encrypted chat applications – the malicious apps are FlyGram and Signal Plus Messenger. Threat actors gained the functionality of fake Signal and Telegram apps by patching the open-source Signal and Telegram apps for Android with malicious code. Signal Plus Messenger is the first documented case of spying on a victim's Signal communications; thousands of users have downloaded spy apps. ESET telemetry has reported detections on Android devices in several countries in the European Union, the United States, Ukraine and other countries around the world. Both apps were later removed from Google Play.

“BadBazaar's malicious code was hidden in Trojan-affected Signal and Telegram apps, which provide victims with a working app experience, but with spying activity in the background,” he explains Lukáš Štefanko, ESET researcher who made the discovery. “The main purpose of BadBazaar is to exfiltrate your device information, contact list, call logs and installed apps list, and to conduct spying on Signal messages by secretly connecting the Signal Plus Messenger app of the victim to the attacker's device,” he adds.

ESET telemetry reports detections from Australia, Brazil, Denmark, Democratic Republic of Congo, Germany, Hong Kong, Hungary, Lithuania, Netherlands, Poland, Portugal, Singapore, Spain, Ukraine, United States and Yemen. Additionally, a link to FlyGram in the Google Play Store was also shared in a Uyghur Telegram group. BadBazaar malware applications have previously been used against Uyghurs and other Turkic ethnic minorities outside of China.

As a partner of the Google App Defense Alliance, ESET identified the latest version of Signal Plus Messenger as malicious and promptly shared its findings with Google. Following the report, the app was removed from the Store. Both apps were created by the same developer and share the same malicious features, and the app descriptions on both stores reference the same developer's website.

Dopo l’avvio iniziale dell’app, l’utente deve accedere a Signal Plus Messenger tramite la funzionalità legittima di Signal, proprio come farebbe con l’app ufficiale per Android. Una volta effettuato l’accesso, Signal Plus Messenger inizia a comunicare con il suo server di command and control (C&C). Signal Plus Messenger può spiare i messaggi di Signal abusando della funzione “collega dispositivo”. Lo fa collegando automaticamente il dispositivo compromesso al dispositivo Signal dell’aggressore. Questo metodo di spionaggio è unico: i ricercatori di ESET non hanno mai riscontrato una funzionalità simile utilizzata in modo improprio da altri malware e questo è l’unico metodo con cui l’aggressore può accedere al contenuto dei messaggi di Signal. ESET Research ha informato gli sviluppatori di Signal di questa falla.

Per quanto riguarda la falsa app di Telegram, FlyGram, la vittima deve effettuare l’accesso tramite la legittima funzionalità di Telegram, come richiesto dall’app ufficiale. Prima che il login sia completato, FlyGram inizia a comunicare con il server C&C e BadBazaar ottiene la possibilità di esfiltrare informazioni sensibili dal dispositivo. FlyGram può accedere ai backup di Telegram se l’utente ha attivato una funzione specifica aggiunta dagli aggressori, funzione che è stata attivata da almeno 13.953 account utente. Il server proxy dell’attaccante può essere in grado di registrare alcuni metadati, ma non può decriptare i dati e i messaggi effettivamente scambiati all’interno di Telegram. A differenza di Signal Plus Messenger, FlyGram non ha la capacità di collegare un account Telegram all’attaccante o di intercettare le comunicazioni crittografate delle sue vittime.

For more technical information on GREF's latest campaigns regarding BadBazaar and trojan-infected spy apps, please see the blog post “BadBazaar espionage tool targets Android via trojanized Signal and Telegram apps” su WeLiveSecurity.

Tagged under: Eset, Strong, Signal, Telegram

About Grandangolo Communications

What you can read next

ESET publishes its Q3 2020 Threat Report: Remote Workers Under RDP Attacks
ESET supports the "Ospedali Riuniti" University Hospital of Foggia in the reorganization of security systems
ESET extends the MDR service to the Managed Service Provider

Customer Press Room

  • VERTIV presents the range of overhead prefabricated infrastructures on a global level, to accelerate the implementation of data centers

    VERTIV ™ Smartrun facilitates installation ...
  • Axiante is a partner of the "Virtual Job Meeting Stem Girls" event

    Participation in the initiative dedicated to ...
  • Vertivia enhances the pre-engineered solution of data centers for EMEA Edge Computing to promote energy efficiency and fastest on-site installations

    La nuova soluzione Vertiv™ SmartAisle&#x...
  • ESET expands the Cyber ​​Threat Intelligence: new feeds and APT reports for companies of all sizes

    Announced at ESET World 2025, the expansion of ...
  • Sentinelone gives a change to the role of partners with the new Global Partnerone Program

    The program provides partners with the tools, ...

Archives

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018

Categories

  • A10
  • Abstract
  • abstract
  • Acronis
  • Ally Consulting
  • Arrow
  • Arrow Electronics
  • Axiante
  • Babel
  • Computer Center
  • Cohesity
  • Italy Cloud Consortium
  • Consys
  • D-Link
  • Eset
  • G.B. Service
  • Habble
  • HiSolution
  • HYCU
  • Icos
  • Information Tecnology
  • Ivanti
  • Link11
  • MobileIron
  • Netalia
  • Nethive
  • Nexthink
  • Nuvis
  • Praim
  • QAD
  • Qualys
  • Red Hot Cyber
  • Riverbed
  • Saviynt
  • Sensormatic
  • SentinelOne
  • Talent Software
  • Vectra
  • Vectra AI
  • Vertiv

Office printing, digital PR, marketing, lead generation: all projects are born from our passion and expertise, with an inevitable touch of creativity and innovation.

COMPANY

Grandangolo Communications Srl
Via Sardegna 19
20146 Milano
Telephone +39 335 8283393
info@grandangolo.it

I SERVIZI

  • Home
  • Company
  • Services
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages

CONTACTS

  • Contacts
  • Cookie policy
  • Privacy policy

© 2019 GRANDANGOLO COMMUNICATIONS SRL | P.IVA IT 06394850967 | All rights reserveD.

Powered by Webpowerplus

TOP