Pretend Alpine Quest app laced with spy ware was used to focus on Russian army Android units, stealing location information, contacts, and delicate information.
A malicious model of Alpine Quest, a preferred Android navigation app, has been discovered carrying spy ware aimed toward Russian army personnel. Safety researchers at Physician Internet uncovered the modified software program embedded with Android.Spy.1292.origin
spy ware able to harvesting information and increasing its performance via distant instructions.
Alpine Quest is usually utilized by outside fanatics, nevertheless it’s additionally relied on by troopers in Russia’s army zones on account of its offline mapping options. That made it a handy cowl for attackers, who repackaged an older model of the app and pushed it as a free obtain via a faux Telegram channel. The hyperlink led to an app retailer concentrating on Russian customers, the place the contaminated software program was listed as a professional model of the app.
As soon as put in, the spy ware collects all kinds of knowledge. Every time the app is opened, it sends the consumer’s telephone quantity, account particulars, contacts, geolocation, and a listing of information saved on the machine to a distant server. A few of this information can also be despatched to a Telegram bot managed by the attackers, together with up to date location particulars each time the consumer strikes.

Physician Internet’s evaluation reveals that this spy ware is able to greater than passive monitoring. After figuring out which information can be found, the malware could be instructed to obtain new modules designed to extract particular content material. Based mostly on its behaviour, the attackers seem particularly fascinated with paperwork shared via messaging apps like Telegram and WhatsApp. It additionally seeks out a file known as locLog, created by Alpine Quest itself, which logs consumer actions intimately.
As a result of the spy ware is bundled with a working model of the app, it seems to be and capabilities usually, giving it time to function unnoticed. Its modular design additionally means its capabilities can develop over time, relying on the attackers’ objectives.
Physician Internet advises customers to keep away from downloading apps from unofficial sources, even once they seem to supply free entry to paid options. Even on official app shops, it’s greatest to keep away from putting in apps you don’t actually want. Malicious apps have been identified to slide previous evaluate processes on each Google Play and the App Retailer.
On the time of writing, the group behind the marketing campaign has not been recognized, and it stays unclear whether or not this operation is home or overseas in origin. Nevertheless, related operations prior to now have been linked to Ukrainian hacktivist teams, together with Cyber Resistance, also referred to as the Ukrainian Cyber Alliance. In 2023, they reportedly focused spouses of Russian army personnel, extracting delicate and private information. Nevertheless, there’s nonetheless no confirmed attribution for the group behind this spy ware marketing campaign.