Nowadays, everyone has a smartphone, and the largest share of the market certainly belongs to Android. This explains why a growing number of cybercriminals are building threats that target Android devices exclusively. One of the most recently spotted malware strains designed for Android devices is called CallerSpy. The CallerSpy threat serves as a spying tool that gathers data on the targeted user. To propagate it freely, the creators of the CallerSpy malware have masked it as a messaging application. The CallerSpy threat poses as either ‘Apex App’ or ‘Chatrious.’ These fake applications were hosted on a website tailored to look like a genuine Google site specifically. The Web page in question had the ‘Gooogle(dot)press.’ domain name. Imitating a Google-related website is a very old trick used by countless cyber crooks through the years. The most common trick is adding an extra ‘o’ (as the fake page contains three ‘o’s instead of two) to the domain name because many users who are not very observant are likely not to spot anything wrong.
The CallerSpy malware is meant to operate rather silently and collect sensitive data from the compromised host for long durations of time. Malware experts have no determined whether the attackers are targeting a certain geographical region or a certain demographic. It is likely that they are simply trying to spread the CallerSpy threat as far and as wide as possible.
The CallerSpy threat has a decently sized list of capabilities. This espionage tool can:
- Take screencaps.
- Collect call logs.
- Record audio using the device’s microphone.
- Gather text messages and manage them.
- Browse and fetch files from the device.
- Grab contact details from the contact list.
The authors of the CallerSpy malware control it remotely via a C&C (Command & Control) server. The data that the CallerSpy threat gathers is transferred to the C&C server of the operators periodically.
The authors of the CallerSpy malware claim that they are working on new variants of the threat. These new projects are meant to target devices running Windows and iOS. If this is true, the creators of the CallerSpy threat will expand their reach greatly. However, this may be nothing more than a lie that would serve to make the fake pages hosting the CallerSpy threat appear more believable.
If you have an Android device, you should consider investing in an anti-malware application that will ensure the safety of your mobile phone/tablet seriously. Also, avoid downloading any applications from third-party websites because they are far more likely to be hosting threatening content.
Do You Suspect Your PC May Be Infected with CallerSpy & Other Threats? Scan Your PC with SpyHunterSpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like CallerSpy as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Security Doesn't Let You Download SpyHunter or Access the Internet?Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.