Thursday, June 12, 2025
HomeAndroidNew Android Malware GhostSpy Grants Attackers Full Control Over Infected Devices

New Android Malware GhostSpy Grants Attackers Full Control Over Infected Devices

Published on

SIEM as a Service

Follow Us on Google News

A chilling new Android malware, dubbed GhostSpy, has emerged as a significant threat to mobile security, according to a detailed report by CYFIRMA.

This high-risk malware employs advanced evasion, persistence, and surveillance techniques to seize complete control over infected devices.

With capabilities ranging from keylogging to bypassing banking app protections, GhostSpy poses a severe risk to personal privacy and financial security.

- Advertisement - Google News

Its multi-stage infection process and stealthy tactics make it a formidable challenge for both individual users and enterprise security teams.

A Sophisticated Threat to Android Security

GhostSpy begins its attack with a deceptive dropper APK that exploits Android’s Accessibility Services and UI automation to silently install a secondary payload, “update.apk,” without user interaction.

GhostSpy
removing the initial APK from the device

By simulating clicks and bypassing permission dialogs, the malware auto-grants itself extensive privileges, including access to phone state, SMS, call logs, camera, microphone, and even Device Admin rights.

Once embedded, it establishes a persistent connection to command-and-control (C2) servers, enabling real-time data theft and remote device manipulation.

Its arsenal includes screen capture, audio and video recording, GPS tracking, and SMS interception, alongside the ability to execute unauthorized financial transactions by reconstructing the UI of secure banking apps using skeleton view methods effectively sidestepping screenshot restrictions.

Unpacking GhostSpy’s Lethal Arsenal

The malware’s persistence is equally alarming. GhostSpy deploys anti-uninstall mechanisms by monitoring system UI for removal attempts and overlaying fake warning dialogs to intimidate users into abandoning uninstallation.

GhostSpy
Dropper 

It leverages full-screen overlays to obscure its activities and uses encrypted code to evade detection.

Additionally, its spying features harvest sensitive data like passwords, OTPs, and 2FA codes from authenticator apps, while also stealing personal files, contacts, and call logs.

The malware’s connection to C2 infrastructure, including domains like stealth[.]gstpainel[.]fun and IP addresses such as 37[.]60[.]233[.]14, facilitates continuous exfiltration and control, with evidence suggesting active maintenance by threat actors, possibly based in Brazil, given cultural and linguistic ties observed in related Telegram and YouTube channels.

According to Cyfirma Report, this sophisticated strain’s ability to maintain long-term access and resist conventional removal methods underscores the urgency for robust defenses.

Security experts recommend strict app whitelisting, mobile threat defense (MTD) solutions, and regular OS updates to mitigate risks.

User education on avoiding sideloading and monitoring for suspicious Accessibility Service usage is also critical.

As GhostSpy continues to evolve, integrating indicators of compromise (IOCs) into threat intelligence feeds and deploying behavioral analysis tools will be essential to detect and neutralize this pervasive threat.

Indicators of Compromise (IOCs)

S.NIndicatorsTypeContext
1e9f2f6e47e071ed2a0df5c75e787b2512ba8a601e55c91ab49ea837fd7a0fc85APKDropper APK
273e647287408b2d40f53791b8a387a2f7eb6b1bba1926276e032bf2833354cc4APKPayload APK
3https[:]//stealth[.]gstpainel[.]funURLC2-exfiltration
437[.]60[.]233[.]14IPC2-exfiltration
5https[:]//gsttrust[.]orgURLC2-exfiltration

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Interpol Dismantles 20,000 Malicious IPs and Domains Tied to 69 Malware Variants

INTERPOL’s Operation Secure has seen the takedown of more than 20,000 malicious IP addresses...

Over 40,000 Internet-Connected Cameras Exposed, Streaming Live Online

Bitsight TRACE has uncovered more than 40,000 security cameras openly accessible on the internet—streaming...

New Secure Boot Vulnerability Allows Attackers to Install Malware in PC and Server Boot Processes

Security researchers from Binarly have uncovered a major software vulnerability in the Unified Extensible...

ConnectWise to Update Code Signing Certificates for ScreenConnect, Automate, and RMM

ConnectWise, a leading provider of remote management and cyber protection tools for managed service...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Interpol Dismantles 20,000 Malicious IPs and Domains Tied to 69 Malware Variants

INTERPOL’s Operation Secure has seen the takedown of more than 20,000 malicious IP addresses...

Over 40,000 Internet-Connected Cameras Exposed, Streaming Live Online

Bitsight TRACE has uncovered more than 40,000 security cameras openly accessible on the internet—streaming...

New Secure Boot Vulnerability Allows Attackers to Install Malware in PC and Server Boot Processes

Security researchers from Binarly have uncovered a major software vulnerability in the Unified Extensible...