Arid Viper’s Sneaky Spyware: How Trojanized Apps are Targeting Middle East Devices

Arid Viper has launched a mobile espionage campaign using trojanized Android apps to spread the spyware AridSpy. Five campaigns since 2022 have targeted users in Palestine and Egypt. The malware pretends to be secure messaging and job opportunity apps, harvesting data and snapping photos when…

Hot Take:

Arid Viper is out here playing the spyware Olympics, and it looks like they’re gunning for gold with their new multi-stage trojan! Who knew cyber espionage could be this ambitious?

Key Points:

  • Arid Viper’s mobile espionage campaign uses trojanized Android apps to distribute AridSpy.
  • The malware is spread through fake websites mimicking messaging and job opportunity apps.
  • Three out of five campaigns are still active, targeting mainly Palestine and Egypt.
  • AridSpy can download additional payloads from a command-and-control (C2) server.
  • The malware takes sneaky selfies if the victim’s phone battery is above 15% and it’s been more than 40 minutes since the last photo.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here