17.3 C
Canberra
Thursday, April 24, 2025

Russian military focused by new Android malware hidden in mapping app


Russian military focused by new Android malware hidden in mapping app

A brand new Android malware has been found hidden inside trojanized variations of the Alpine Quest mapping app, which is reportedly utilized by Russian troopers as a part of warfare zone operational planning.

Attackers promote the trojanized app as a free, cracked model of the premium Alpine Quest Professional, utilizing Telegram channels and Russian app catalogs for distribution.

AlpineQuest is a official GPS and topographic mapping app for Android utilized by adventurers, athletes, search-and-rescue groups, and army personnel, valued for its offline capabilities and precision.

The app has two variations: a free Lite model with restricted options and a paid Professional model that is freed from monitoring libraries, analytics, and commercials.

The adware, which was found by researchers at Russian cell antivirus firm Physician Net, hides inside a totally working Alpine Quest app, lowering suspicion and creating worthwhile knowledge theft alternatives.

As soon as launched, it makes an attempt to steal communication knowledge and delicate paperwork from the machine, probably revealing particulars about military operations. Particularly, the adware performs the next actions:

  • Sends the person’s cellphone quantity, contacts, geolocation, file data, and app model to attackers.
  • Screens location modifications in real-time and sends updates to a Telegram bot.
  • Downloads further modules to steal confidential recordsdata, particularly these despatched by way of Telegram and WhatsApp.
  • Seeks the ‘locLog’ file from Alpine Quest, which accommodates location historical past logs.

Physician Net tracks the beforehand undocumented adware as ‘Android.Spy. 1292.origin’ however didn’t make any attributions about its origin in its report. Indicators of compromise are accessible right here.

Telegram channel distributing the trojanized AlpineQuest app
Telegram channel distributing the trojanized AlpineQuest app
Supply: Physician Net

Turning the tables

The tactic of focusing on troopers was beforehand related to Russian hacking operations, usually linked to state-sponsored risk teams accumulating intelligence for the Russian military.

In December 2022, hackers utilizing a compromised Ukrainian Ministry of Protection e mail account tried subsequent infections by utilizing DELTA, a Ukrainian intelligence assortment and administration system as bait.

In October 2024, the Russian risk group ‘UNC5812’ focused Ukrainian conscripts with Home windows and Android malware by way of a pretend company named ‘Civil Protection.’

Extra just lately, in February 2025, Google researchers revealed that Russian risk actors of the APT44 group used malicious QR codes to trick targets into syncing their Sign accounts with unauthorized gadgets.

The invention of the trojanized AlpineQuest app reveals that these sneaky assaults are orchestrated from each ends of the battle, as intelligence assortment stays essential in gaining battlefield benefit.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles