The “eXotic Visit” campaign, a sophisticated Android malware operation, has surfaced, primarily impacting users in South Asia, particularly in India and Pakistan. Spearheaded by the group known as Virtual Invaders, the campaign utilizes dedicated websites and the Google Play Store to distribute malware-laden applications. Disguised as messaging services and utility apps, these malicious programs contain the Android XploitSPY RAT, allowing perpetrators to gather sensitive data from infected devices, including GPS locations, microphone recordings, and SMS messages.
Despite the relatively low number of installs, around 380 users have unwittingly downloaded these apps, falling prey to the espionage tactics employed by the threat actors. The malware’s extensive capabilities include extracting notification details from popular apps like WhatsApp and Facebook, as well as capturing images and enumerating files from specific directories. To evade detection, the malware employs obfuscation techniques, emulator detection, and a native library named “defcome-lib.so” to conceal command-and-control server information.
The distribution strategy of the campaign starts from dedicated websites and eventually extends to the official Google Play Store, reflecting the adaptability and persistence of the attackers. This infiltration method underscores the importance of vigilance for users in the affected regions and highlights the ongoing threat posed by sophisticated cyber espionage campaigns targeting Android users. As the campaign continues to evolve, cybersecurity researchers stress the critical need for robust defenses and heightened awareness to mitigate the risks posed by such malicious activities in the future.