Android backdoor spies on Russian business employees
Aug. 25, 2025, 11:32 a.m.
Description
A sophisticated Android backdoor named Android.Backdoor.916.origin is targeting Russian business representatives. The malware, disguised as an antivirus app called 'GuardCB', has extensive surveillance capabilities including intercepting calls, streaming camera footage, stealing data from messaging apps and browsers, and keylogging. Distributed via messenger apps, it requests numerous system permissions and connects to C2 servers for commands. The backdoor can transmit SMS messages, contact lists, call logs, location data, and captured audio/video streams. It uses Accessibility Service to log keystrokes and intercept content from specific apps like Telegram and Chrome. The malware is believed to be used for targeted attacks rather than mass distribution.
Tags
Date
- Created: Aug. 25, 2025, 10:55 a.m.
- Published: Aug. 25, 2025, 10:55 a.m.
- Modified: Aug. 25, 2025, 11:32 a.m.
Attack Patterns
- Android.Backdoor.916.origin
Additional Informations
- Finance
- Government
- Russian Federation