Amid growing concerns over digital privacy, security teams have uncovered an alarming development in the world of Android spyware. A surge in malicious campaigns is targeting privacy-conscious users by masquerading as reputable messaging apps like Signal and ToTok. These deceptive operations exploit trust by delivering trojanized applications that seek extensive permissions upon installation.
Emergence of AndroidSpy Variants
Researchers have identified two prominent ransomware families—AndroidSpy.ProSpy and AndroidSpy.ToSpy—each employing unique strategies to infiltrate devices. ProSpy poses as plugins for Signal and ToTok, while ToSpy operates as a standalone application mimicking the ToTok service. Their distribution mechanisms involve phishing websites and counterfeit app stores, which entice users to sideload APKs from unfamiliar sources.
Specifically, domains like signal.ct.ws and encryption-plugin-signal.com-ae.net were found disseminating ProSpy under the guise of a “Signal Encryption Plugin,” whereas ToSpy variants appeared on sites resembling the Samsung Galaxy Store. These deceptive campaigns are regionally concentrated in the United Arab Emirates, highlighting a targeted approach in threat distribution.
Invasive Data Collection
Upon installation of these rogue apps, users are prompted to permit access to sensitive information, including contacts, SMS, file storage, and device data. Should these permissions be granted, the spyware proceeds to collect an array of personal data, such as hardware and OS details, chat backups, media files, documents, and lists of installed applications. Notably, ToTok-specific spyware is designed to seek out “.ttkmbackup” files. Both AndroidSpy families make use of hardcoded AES-CBC encryption to secure the exfiltrated data before transmitting it over HTTPS POST to command-and-control servers.
Threat Persistence and User Advisories
These malicious applications rely heavily on social engineering techniques and manual APK installations for initial infiltration. They sustain their presence within devices by registering foreground services, utilizing activity-alias entries to masquerade as “Play Services,” and employing AlarmManager and BOOT_COMPLETED receivers to execute upon device startup.
Security experts urge users to exercise caution by refraining from sideloading apps from unreliable sources and ensuring that Google Play Protect remains active on their devices to combat such threats. These measures are crucial in protecting personal information and maintaining digital privacy amid the rise of sophisticated spyware campaigns like AndroidSpy.



