Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Multi-Stage “BadPaw” Malware Campaign Targets Ukraine

March 5, 2026

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

March 5, 2026

Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers

March 5, 2026
Facebook X (Twitter) Instagram
Thursday, March 5
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App
News

RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App

Team-CWDBy Team-CWDMarch 3, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new mobile espionage campaign exploiting civilian fears during the ongoing Israel-Iran conflict has been identified, with attackers distributing a trojanized version of Israel’s official Red Alert rocket warning app through SMS phishing.

The malicious operation, discovered by CloudSEK and dubbed RedAlert, bypasses the Google Play Store and instead lures victims into sideloading a fake update that closely imitates the legitimate application from the Israel Defense Forces Home Front Command.

The fraudulent app mimics the authentic interface and continues to deliver real rocket alerts, while a surveillance payload runs in the background.

Unlike the official version, which requires only notification access, the weaponized variant aggressively requests high-risk permissions, including access to SMS messages, contacts and precise GPS location data.

Researchers said the malware uses sophisticated anti-detection techniques. It spoofs the original app’s 2014 signing certificate and falsifies installation data to appear as though it was downloaded from the Play Store.

By manipulating Android’s internal package manager through reflection and proxy hooks, the software avoids standard integrity checks and conceals secondary payloads embedded within the application.

Multi-Stage Infection Chain

The infection process unfolds in three stages:

  1. An initial loader that cloaks the application and extracts hidden assets

  2. A dynamically loaded intermediate payload stored as an internal file

  3. A final executable component that activates spyware capabilities and command-and-control communication

Once active, the malware continuously monitors permission changes. The moment a user grants access to a single sensitive feature, data harvesting begins. Stolen information, including entire SMS inboxes, contact lists and real-time location coordinates, is staged locally before being transmitted to attacker-controlled servers via repeated HTTP POST requests.

Read more on mobile spyware threats: New Mobile Spyware ZeroDayRAT Targets Android and iOS

Strategic And Physical Security Risks

Network analysis linked outbound traffic to infrastructure hosted on AWS and proxied through Cloudflare, obscuring the operators’ backend systems. The command-and-control (C2) endpoint api.ra-backup[.]com was observed receiving exfiltrated data.

The CloudSEK researchers warned that the campaign poses more than a conventional cyber risk. Continuous GPS tracking during active air raids could expose civilian shelter locations or track the movement of military reservists. Intercepted SMS messages may also enable attackers to bypass two-factor authentication (2FA) or conduct targeted psychological operations.

Beyond espionage, the operation threatens public trust. By hijacking the branding of a critical emergency application, the campaign risks undermining confidence in official alert systems at a time when civilians depend on them most.

Security teams recommend immediate device isolation, revocation of administrative privileges and, in most cases, a full factory reset to remove the malware. Network administrators are urged to block known malicious domains and restrict sideloaded applications through mobile device management policies.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDouble-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More
Next Article Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
Team-CWD
  • Website

Related Posts

News

Multi-Stage “BadPaw” Malware Campaign Targets Ukraine

March 5, 2026
News

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

March 5, 2026
News

Global Takedown Neutralizes Tycoon2FA Phishing Service

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why you should never pay to get paid

September 15, 2025

Can password managers get hacked? Here’s what to know

November 14, 2025

How to tell if a voice call is AI or not

February 23, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.