Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Cybersecurity»Indian APT Group ‘Bahamut’ Employing Fake Android App to Steal Signal and WhatsApp User Data

    Indian APT Group ‘Bahamut’ Employing Fake Android App to Steal Signal and WhatsApp User Data

    By NotesleuNo Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    In a concerning cyber attack, hackers have been discovered using a deceptive Android application, ‘SafeChat,’ to infiltrate devices with spyware malware. The malicious software is designed to pilfer call logs, text messages, and GPS locations from targeted smartphones.

    The Android spyware appears to be a variant of the known “Coverlm” malware, notorious for extracting data from popular communication apps like Telegram, Signal, WhatsApp, Viber, and Facebook Messenger.

    Researchers from CYFIRMA have identified the Indian APT hacking group ‘Bahamut’ as the mastermind behind this campaign. Their latest modus operandi involves spear-phishing messages sent via WhatsApp, delivering harmful payloads directly to unsuspecting victims.

    CYFIRMA analysts have pointed out striking similarities between Bahamut’s tactics, techniques, and procedures (TTPs) and those of another Indian state-sponsored threat group known as ‘DoNot APT’ (APT-C-35). The latter had previously infected Google Play Store with fake chat apps acting as spyware.

    Notably, Bahamut had employed counterfeit VPN apps for the Android platform, complete with extensive spyware functionalities, as reported by ESET late last year.

    In this latest campaign observed by CYFIRMA, Bahamut focuses its attacks on individuals located in South Asia.

    “Safe Chat” – An Elaborate Ruse

    While CYFIRMA’s researchers have not delved into the social engineering aspect of the attack, it is common for victims to be lured into installing the chat app under the guise of transitioning to a more secure platform.

    The devious Safe Chat app features a misleading interface, giving the appearance of a genuine chat application. It further manipulates victims by leading them through a seemingly legitimate user registration process, enhancing its credibility and serving as a cover for the embedded spyware.

    A crucial step in the infection process involves acquiring permissions to use Accessibility Services, which are subsequently abused to grant the spyware further permissions.

    These additional permissions grant the spyware access to the victim’s contact list, SMS messages, call logs, external device storage, and precise GPS location data from the compromised device. The app also requests the user’s approval to exclude it from Android’s battery optimization subsystem, ensuring continuous background processes even when the app is not actively used.

    CYFIRMA’s investigation reveals that the threat actor designed Safe Chat to interact with other chat applications already installed on the victim’s device, using intents to access specific directories and target apps.

    Furthermore, a dedicated data exfiltration module is employed to transfer stolen information from the infected device to the attacker’s Command and Control (C2) server through port 2053. The stolen data is encrypted using an RSA, ECB, and OAEPPadding-supported module, while the hackers cleverly use a “letsencrypt” certificate to evade interception of network data.

    Bahamut’s State-Sponsored Activities

    Based on substantial evidence, CYFIRMA has linked Bahamut to be operating on behalf of a specific state government in India. The shared use of the same certificate authority as the DoNot APT group, similar data-stealing methodologies, common targeting scope, and the utilization of Android apps to infect targets all suggest a close collaboration or overlap between the two groups.

    The situation raises grave concerns about the security of communication apps and highlights the need for users to remain vigilant against downloading applications from unverified sources. As such state-sponsored hacking groups continue to develop sophisticated techniques, it becomes imperative for individuals and organizations to stay abreast of cybersecurity best practices to safeguard their sensitive data and privacy.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 57
    Featured
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThis AI Paper Deploys a Light-Weight Foundational Model in Outer Space for the First Time
    Next Article Meta Develops AI Chatbot with Abraham Lincoln’s Personality, Reveals Report

    Related Posts

    Cyber Attacks December 26, 2025

    2 Million Affected by SQL Injection and XSS Data Breach

    December 26, 2025
    Cyber Attacks December 26, 2025

    Cybersecurity Experts Uncover ToddyCat’s Expanded Arsenal of Data Theft Tools

    December 26, 2025
    Tech December 26, 2025

    “I Had a Dream” and Generative AI Jailbreaks

    December 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.