ESET researchers have uncovered two refined Android adware campaigns that concentrate on customers searching for safe communication platforms by impersonating fashionable messaging apps Sign and ToTok.
These malicious operations seem to focus totally on residents of the United Arab Emirates (UAE), using misleading web sites and social engineering techniques to distribute beforehand undocumented malware households.
The investigation revealed two distinct Android adware households working by way of rigorously orchestrated deception campaigns. Android/Spy.ProSpy masquerades as upgrades or plugins for each Sign and ToTok messaging purposes, whereas Android/Spy.ToSpy solely targets ToTok customers by impersonating the app itself.
Neither malicious utility was obtainable by way of official app shops, requiring victims to manually set up the software program from third-party web sites designed to seem official.
The plugin was distributed by way of phishing utilizing two devoted web sites (https://sign.ct[.]ws and https://encryption-plug-in-signal.com-ae[.]web/), and it was obtainable solely within the type of an Android app that required customers to allow handbook set up from unknown sources.
One notably refined distribution methodology concerned a pretend web site mimicking the Samsung Galaxy Retailer, which efficiently lured customers into downloading and putting in a malicious model of the ToTok app.
ProSpy Marketing campaign
The ProSpy marketing campaign, found in June 2025 however believed to have been lively since 2024, distributes malware by way of three misleading web sites impersonating Sign and ToTok platforms.
The marketing campaign affords malicious APK information disguised as enhancements, particularly marketed as “Sign Encryption Plugin” and “ToTok Professional”.
The Sign Encryption Plugin variant was distributed by way of devoted phishing web sites utilizing domains that included “.ae.web” of their construction, suggesting a deliberate give attention to UAE residents.

Upon set up, the malicious app requests intensive permissions to entry contacts, SMS messages, and system information earlier than starting background knowledge exfiltration.
After the preliminary setup, the Sign Encryption Plugin employs a complicated disguise approach, altering its look on the system to appear to be “Play Providers” and redirecting customers to official Google Play Providers when clicked.

This activity-alias manipulation successfully masks the adware’s presence whereas sustaining persistent entry to delicate knowledge.
ToSpy Marketing campaign
The ToSpy marketing campaign demonstrates much more focused regional operations, with confirmed detections originating from gadgets situated within the UAE.

Researchers recognized six samples sharing equivalent malicious code and developer certificates, indicating coordination by a single menace actor.
Proof suggests the ToSpy marketing campaign started in mid-2022, with the developer certificates created on Might 24, 2022, and associated domains registered across the similar timeframe. A number of command and management servers stay lively, indicating ongoing operations on the time of publication.
The malware particularly targets ToTok backup information with the .ttkmbackup extension, demonstrating explicit curiosity in extracting chat historical past and app knowledge. This focus aligns with ToTok’s regional reputation within the UAE and surrounding areas.
Each adware households exhibit intensive knowledge assortment capabilities, systematically exfiltrating system data, saved SMS messages, contact lists, and information throughout a number of classes together with paperwork, photographs, movies, and archives.
The malware maintains persistent background operations by way of foreground providers, alarm managers, and boot persistence mechanisms.
ToSpy employs AES encryption in CBC mode with a hardcoded key to safe exfiltrated knowledge earlier than transmission to command and management servers by way of HTTPS POST requests.
The identical encryption secret is used throughout all six recognized samples, suggesting centralized growth and deployment.
Safety and Prevention Measures
Google Play Shield robotically defends Android customers towards recognized variations of this adware, offering default safety for gadgets with Google Play Providers.
ESET shared their findings with Google as a part of the App Protection Alliance partnership, guaranteeing speedy response to those rising threats.
Safety specialists emphasize the significance of avoiding app installations from unofficial sources and disabling the “unknown sources” set up choice.
Customers ought to train explicit warning when downloading apps or add-ons claiming to boost trusted communication providers, particularly when prompted to put in software program exterior official app shops.
The invention of those campaigns highlights the evolving sophistication of cell adware operations and the significance of sustaining vigilance when downloading communication purposes, notably in areas the place sure apps could also be restricted or unavailable by way of official channels.
IoCs
SHA-1 | Filename | Detection | Description |
---|---|---|---|
03FE2FCF66F86A75242F6112155134E66BC586CB | e18683bc061e888f158c9a3a7478615df2d7daae1952a072d7f549cd1c1e326a.apk | Android/Spy.ToSpy.A | Android ToSpy adware impersonating ToTok app. |
B22D58561BB64748F0D2E57B06282D6DAF33CC68 | totok_v1.8.8.411.apk | Android/Spy.ToSpy.A | Android ToSpy adware impersonating ToTok app. |
BDC16A05BF6B771E6EDB79634483C59FE041D59B | totok_V2.8.3.10113.apk | Android/Spy.ToSpy.A | Android ToSpy adware impersonating ToTok app. |
DB9FE6CC777C68215BB0361139119DAFEE3B3194 | totok_Version_1_9_5_433.apk | Android/Spy.ToSpy.A | Android ToSpy adware impersonating ToTok app. |
DE148DDFBF879AB2C12537ECCCDD0541A38A8231 | v1_8_6_405_totok.apk | Android/Spy.ToSpy.A | Android ToSpy adware impersonating ToTok app. |
CE378AE427E4BD70EAAED204C51811CD74F9A294 | v1_8_7_408_totok.apk | Android/Spy.ToSpy.A | Android ToSpy adware impersonating ToTok app. |
7EFEFF53AAEBF4B31BFCC093F2332944C3A6C0F6 | ae.totok.chat.apk | Android/Spy.ProSp.A | Android ProSpy adware impersonating ToTok Professional. |
154D67F871FFA19DCE1A7646D5AE4FF00C509EE4 | signal-encryption-plugin.apk | Android/Spy.ProSp.A | Android ProSpy adware impersonating Sign Plugin. |
154D67F871FFA19DCE1A7646D5AE4FF00C509EE4 | signal_encyption_plugin.apk | Android/Spy.ProSp.A | Android ProSpy adware impersonating Sign Plugin. |
43F4DC193503947CB9449FE1CCA8D3FEB413A52D | toktok.apk | Android/Spy.ProSp.A | Android ProSpy adware impersonating ToTok Professional. |
579F9E5DB2BEFCCB61C833B355733C24524457AB | totok.apk | Android/Spy.ProSp.A | Android ProSpy adware impersonating ToTok Professional. |
80CA4C48FA831CD52041BB1E353149C052C17481 | totok_encrypted_enStr.apk | Android/Spy.ProSp.A | Android ProSpy adware impersonating ToTok Professional. |
FFAAC2FDD9B6F5340D4202227B0B13E09F6ED031 | signal-encryption-plugin.apk | Android/Spy.ProSp.A | Android ProSpy adware impersonating ToTok Professional. |
Comply with us on Google Information, LinkedIn, and X to Get On the spot Updates and Set GBH as a Most well-liked Supply in Google.