Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Unmasking the Shadowy Actor: Android Spyware Targeting Russian Soldiers in a Deceptive Mapping Software


Researchers have uncovered a sophisticated Android spyware hidden within a fake version of the popular Alpine Quest mapping software, targeting Russian military personnel in a deceptive campaign. The malicious app was discovered by Doctor Web researchers and has been causing concern among cybersecurity experts.

  • Android spyware Android.Spy.1292.origin was discovered embedded within a fake version of Alpine Quest mapping software.
  • The malicious app was spread via Russian Android catalogs and a fake Telegram channel, disguising itself as a legitimate update.
  • The malware gathers user data, including phone number, accounts, contacts, geolocation, and stored files, and transmits it to a command-and-control server.
  • The attack highlights the risks of using third-party apps from untrusted sources and emphasizes the importance of digital literacy and responsible app usage practices.



  • Android spyware, specifically designed to target Russian military personnel, has been discovered embedded within a fake version of the popular Alpine Quest mapping software. This malicious app, dubbed Android.Spy.1292.origin, was found by researchers at Doctor Web and has been causing concern among cybersecurity experts.

    The malicious code was spread via Russian Android catalogs and distributed through a fake Telegram channel, where it was masqueraded as a legitimate update for the Alpine Quest Pro app. The attackers exploited the popularity of the original Alpine Quest software among athletes, travelers, and hunters, as well as its widespread use by Russian military personnel in war zones.

    Upon launching the trojanized app, Android.Spy.1292.origin silently gathers and transmits data to a command-and-control server, including the user's phone number, accounts, contact list, current date, geolocation, stored file details, and app version. This information is then shared with the attackers' Telegram bot whenever the device's location changes.

    The malware also enables the threat actors to download and run extra modules to steal specific data, such as confidential documents shared through Telegram and WhatsApp, and sensitive files like locLog files generated by Alpine Quest. Its modular design allows it to expand its capabilities and perform a broader range of malicious activities.

    This sophisticated attack highlights the risks associated with using third-party apps from untrusted sources, especially those that are free or offered at discounted prices. As cybersecurity expert Pierluigi Paganini notes, "Downloading Android apps only from trusted sources like official app stores, avoiding Telegram channels and shady sites, and verifying app distributors can help prevent such attacks."

    The incident serves as a reminder of the ongoing cat-and-mouse game between threat actors and cybersecurity professionals. As new threats emerge, it is essential for individuals to remain vigilant and take proactive measures to protect themselves from such malicious activities.

    In conclusion, the discovery of Android.Spy.1292.origin in Alpine Quest highlights the importance of digital literacy and responsible app usage practices. By staying informed about emerging threats and taking steps to secure their devices and personal data, users can significantly reduce the risk of falling victim to such attacks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Unmasking-the-Shadowy-Actor-Android-Spyware-Targeting-Russian-Soldiers-in-a-Deceptive-Mapping-Software-ehn.shtml

  • https://securityaffairs.com/176886/malware/android-spyware-hidden-in-mapping-software-targets-russian-soldiers.html


  • Published: Thu Apr 24 01:34:59 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us