Tuesday, October 27, 16:53
Home security Android chat application spies on users!

Android chat application spies on users!

chat application

A Android chat application which claims to be a safe platform messaging, spies on users and saves data their in an unsafe location that is publicly available. The reason for the application Welcome Chat, which seems to be targeting users from a specific area and is based on open source code for recording calls, stealing messages and tracking them users.

Normal permissions for a chat application

The developers of Welcome Chat promoted it as a secure communication solution that is available from Google Play store. The chat application intended for Arabic-speaking users. Note that some countries in the Middle East ban this type of application.

The company's researchers ESET found the Android chat application he also does many things, which he does not officially mention or advertise. They also saw the app was never part of the official Android store.

Applications outside the Play Store require them users allow installation from unknown sources, which is the case with Welcome Chat.

If users follow this procedure, the chat application requests permission to send and view SMS messages, access files, record audio, and access in the contacts and location of the device. These permissions are normal for a chat app.

The application uses open source code to spy on users

Once the user gives permission, Welcome Chat starts sends information about device and communicate with its command and control (C2) server every five minutes.

Researchers say that monitor communication with other users Welcome Chat is at the heart of this malicious application. Other features include:

  • theft of sent and received messages
  • theft of call history
  • theft of the victim's contact list
  • photo theft
  • theft of recorded telephone calls
  • sending location data and other system information

The researchers found that much of the code used for espionage came from public sources (eg open-source projects, etc.).

Whoever created Welcome Chat did not spend much time. He probably looked at Internet for the desired espionage operation and used the first code he found.

This conclusion comes from the "age" of the code, which in some cases is available to the public for at least five years. Call logging and location tracking, for example, are "eight years old".


User data is accessible

"The data are not encrypted and therefore, not only are they available to the attacker, but also to anyone on the same network. " says the ESET researcher, Lukas Stefanko.

The chat application database includes everything except the user account password: names, addresses e-mail, phone numbers, device tokens, profile pictures, messages, and friends list.

Initially, researchers believed that Welcome Chat was a legitimate chat application that had been infected by criminals. So they tried to warn them developers. However, they found a pure variant in VirusTotal and realized that the application was created from scratch to spy users.

Although there is no strong evidence, the chat app may be the work of the same team behind the BadPatch, a spy campaign launched in 2017 targeting users in the Middle East.


Please enter your comment!
Please enter your name here

Digital Fortress
Digital Fortresshttps://www.secnews.gr
Pursue Your Dreams & Live!


How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...

Australia: Enhances cybersecurity and privacy!

The Government of New South Wales in Australia has set up a task force to strengthen cybersecurity and protection ...

More than 100 irrigation systems were left exposed on the internet

More than 100 smart irrigation systems were left exposed on the internet without a password last month, allowing anyone to access ...

Violation in Nitro Software most likely affects Google, Apple, Microsoft

Nitro PDF (Nitro Software) service has suffered a data breach, which is said to affect many well-known companies, such as Google, ...

Hacker steals $ 24 million from cryptocurrency service Harvest Finance

A hacker has stolen "cryptocurrency assets" worth about 24 million dollars from the decentralized financing service (DeFi) Harvest Finance, a web portal ...