Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » CTM360 reveals the game that masks
Global Security

CTM360 reveals the game that masks

AdminBy AdminApril 10, 2025No Comments5 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Review PlayPraetor Masquerading Party Options

CTM360 He has now identified a much larger degree of Praetor Play’s current company. What started with 6000+ URLs very specific banking attacks has grown to 16,000+ with several options. This study continues, and much more will be detected.

As before, all recently revealed reproductions mimic legitimate applications lists, cheating users in installing malicious Android applications or exposing sensitive personal information. While these incidents were initially isolated, a further investigation revealed a global coordinated campaign that poses a significant threat to the Play Store ecosystem integrity.

Evolution of threats

In this report Expanded on previous PlayPraetor studies, emphasizing the opening of five recently identified options. These options show an increase in the complexity of the company in terms of attack methods, channels of distribution and social engineering tactics. PlayPraetor’s constant evolution demonstrates its adaptation and sustainable orientation to Android ecosystem.

Option characteristic of orientation and regional orientation

In addition to the original Bank Trojan PlayPraetor, five new options –Fish. Rat. Pwa. Phantomand Veil– were identified. These options are distributed through fake sites that are very reminiscent of Google Play store. Although they share the general harmful behavior, each option demonstrates unique characteristics, taking into account specific regions and use cases. Target regions include Philippines, India, South Africa and various world markets.

These variants use the combination of credentials, the possibilities of remote access, deceptive web attitudes, abuse of Android availability and stealth methods that hide malicious activity behind the legitimate brand.

Attack goals and focus in the area

Although each option has unique features and regional targeting, a common topic for all PlayPraetor samples – this is their emphasis on Financial sector. The actors of the threat behind these options seek to steal bank accordion data, credit/debit card data, access to a digital wallet and, in some cases, conduct fraudulent operations, transferring funds to Mule accounts. These monetization strategies indicate a well -organized operation -focused operation.

Summary option and idea of ​​detection

Five new options –Fish. Rat. Pwa. Phantomand Veil– Currently, they are under active investigation. Some options have confirmed the detection statistics and others are still analyzed. A comparative table that summarizes these options, their capabilities and regional goals included in the following section, as well as a detailed technical analysis.

Name of option Functionality Description Target industry Revealed cases (approximately.)
PlayPraetor Pwa Deceptive progressive web application Installs fake PWA, which mimics legitimate applications, creates shortcuts on the main screen, and triggers constant press notifications to lure interaction. Technology industry, financial industry, gaming industry, gambling industry, e -commerce industry 5400+
PlayPraetor Phish Webview Phiscing The Webview-based application that launches a phishing web page for theft users. Financial, telecommunications, fast food industry 1400+
PlayPraetor Phantom Hidden stability and execution of commands Exploits Android accessibility services for constant control. Works silently, exfiltrates data, hides the icon, blocks the removal and poses as a system update. Financial Industry, Gambling Industry, Technology Industry These options are currently under investigation to determine their accuracy.
PlayPraetor Patsuk Trojan remote access The attacker grants are full of remote control of the infected device, the inclusion of observation, data theft and manipulation. Financial industry
PlayPraetor Veil Phishing based on regional and invitations Describe, using legitimate branding, restricts access through invitations codes and imposes regional restrictions to avoid identifying and increasing confidence among local users. Financial industry, energy industry

Geographical distribution and targeting

The CTM360 analysis shows that while PlayPraetor variants are globally spread, some strains show broader information strategies than others. Notable that Phantom-ww The option stands out for its global targeting approach. In this case, the threat subjects advocate a widely recognized application with global attractiveness, allowing them to make a broader network and increase the likelihood of attracting victims in several regions.

Among the revealed options, Pwa The option appeared as the most common, with a wide range of geographical regions. Its reaching spans South America, Europe, Oceania, Central Asia, South Asiaand parts African continentEmphasizing its role as the most common option within the PlayPraetor company.

Other options have shown more specific regional targeting. A Fish The option was also distributed to several regions, though with a slightly less rich than PWA. Unlike this Rat the option showed a noticeable concentration of activity in South AfricaAssuming that is focused on the region. Exactly the same Veil The option was observed first in The United States and choose African peoplesReflecting a more focused deployment strategy.

How to remain safe

To mitigate the risk of falling victim playback and similar scams:

✅ Download only apps from the official Google Play Store or Apple App Store

✅ Check app developers and read reviews before installing any app

✅ Avoid providing unnecessary permits, especially affordable services

✅ Use mobile security solutions to detect and lock APK-infected malware

✅ Be aware of new threats by following cybersecurity reports

Read the full report Study behaviors, understanding of identification and effective recommendations.

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.