🚀 A CloudSEK se torna a primeira empresa de segurança cibernética de origem indiana a receber investimentos da Estado dos EUA fundo
Leia mais

The RedAlert mobile espionage campaign represents a critical threat vector directly exploiting the heightened civilian panic surrounding the current Israel-Iran kinetic conflict. Threat actors are capitalizing on the desperate need for real-time rocket alerts by distributing a trojanized version of the official Home Front Command application through targeted SMS phishing (smishing). This delivery mechanism deliberately bypasses the Google Play Store—the sole legitimate repository for the authentic "Red Alert" app, which operates cleanly with only basic notification access. By manipulating victims into sideloading this malicious APK under the guise of an urgent wartime update, the adversaries successfully deploy a fully functional alert interface that masks an invasive surveillance engine designed to prey on a hyper-vigilant population.
Beneath the legitimate-looking exterior, the malware executes a sophisticated multi-stage infection, utilizing dynamic proxy hooks to spoof the original application's 2014 signing certificate and evade Android's system integrity checks. The core payload, heavily obfuscated within the class, aggressively polls for high-risk system permissions to intercept complete SMS inboxes, harvest contact books, and continuously track exact GPS coordinates. This gathered intelligence is systematically staged and exfiltrated to attacker-controlled infrastructure via a rapid upload loop. The combination of real-time civilian location tracking during active air raids and the ability to bypass 2FA through SMS interception transforms this campaign into a severe strategic and physical security risk, demanding immediate quarantine protocols and network-level blocking.

The code uses reflection to hook the IPackageManager (specifically through sPackageManager in ActivityThread).

1. The Header bytes (AQAAAr8) The first few bytes of the decoded string are instructions for the malware's DataInputStream on how to read the payload:
2. The X.509 Certificate (wggK7MIIBo6AD...) The remaining 703 bytes constitute the actual certificate. Parsing this ASN.1/DER structure reveals the following cryptographic details:
The attachBaseContext method contains a routine to extract a hidden file:

Why this is malicious: This is a technique used to load a secondary "dropped" payload (like a .dex or .so file) while making the system believe it is interacting with the original APK. By updating mAppDir and mApplicationInfo via reflection, the malware can execute code from the umgdn file while hiding it from standard inspection.
The code avoids using standard Android APIs directly, opting instead for:

The malware's infection chain is split into three distinct stages:

1. Execution and User Interface (UI) Cloaking:
During dynamic execution, the trojanized package (com.red.alertx) successfully launches and perfectly mirrors the graphical user interface (GUI) of the official Israeli Home Front Command Red Alert application. To the end user, there is absolutely no visual discrepancy in the core functionality, as the malicious app actively delivers real rocket attack alerts to maintain its disguise.

The critical behavioral divergence occurs exclusively during the initial application launch and onboarding phase. While the legitimate application restricts its prompt strictly to standard Notification access to push alerts, the malicious payload aggressively prompts the victim for high-risk system permissions (such as Contacts, SMS, and Location), masking them as necessary requirements for the app's core operations.
2. Runtime Behavior and Exfiltration Triggers:
Once executed, the malware initiates a silent background thread that continuously polls the Android OS for permission state changes. It does not wait for a complete set of permissions to be granted; the moment the user approves a single requested permission, the associated data harvesting module is dynamically triggered.
The malware was observed staging the collected intelligence (including the SMS inbox, complete contact lists, and real-time GPS coordinates) into categorized local files before initiating its exfiltration loop.
3. Network Communications and Infrastructure:
Network traffic analysis confirms that the malware maintains aggressive, persistent communication with its Command and Control (C2) infrastructure. Once data is staged locally, a dedicated uploader thread loops, establishing rapid outbound connections to transmit the payload via HTTP POST requests to https://api[.]ra-backup[.]com/analytics/submit.php.

The following IP addresses were captured during the dynamic execution phase, representing the infrastructure facilitating the exfiltration and C2 communications:
Note: The presence of the 104.21.x.x and 172.67.x.x addresses indicates the threat actors are leveraging Cloudflare to proxy and shield their true backend infrastructure, while the 44.x.x.x addresses point to AWS hosting environments.
App Name: RedAlert.apk
1. Weaponization of Active Wartime Panic (The Lure):
With Iranian retaliatory ballistic missile and drone strikes actively targeting Israeli territory and US bases across the Gulf, citizens are desperate for real-time early warning systems. Masquerading as the official Israeli Home Front Command's "Red Alert" application directly exploits this life-or-death urgency, virtually guaranteeing an exceptionally high infection rate as victims bypass standard security hygiene in search of safety.
2. Kinetic Targeting and Physical Security Risks (Location Tracking):
In the context of an active, multi-front war, the malware’s continuous GPS tracking functionality transcends standard digital surveillance. The real-time geolocation of thousands of infected devices provides adversaries—with crowdsourced, actionable intelligence. This data can be weaponized to map civilian shelter locations, track the mass movement of displaced populations, or identify the concentration and deployment of IDF reservists, potentially optimizing the targeting of incoming missile barrages.
3. Strategic Intelligence Gathering (Data Exfiltration):
The aggressive exfiltration of the device’s AccountManager, complete contact lists, and SMS inbox allows state-sponsored threat actors to rapidly map the social graphs of the infected population. This mass data harvesting enables the identification of high-value targets (HVTs)—such as military personnel, government officials, or defense contractors—for secondary exploitation. Furthermore, intercepting SMS communications in real-time allows adversaries to bypass 2FA on critical infrastructure networks or conduct highly targeted psychological warfare (e.g., sending demoralizing or deceptive SMS messages during infrastructure blackouts).
4. Erosion of Emergency Response Integrity:
By successfully hijacking the branding and functionality of a critical life-saving application, this campaign executes a devastating form of information warfare. If the civilian population learns that emergency alert applications are heavily trojanized, public trust in official government broadcast channels will collapse. Citizens may hesitate to install legitimate Home Front Command updates or begin ignoring authentic sirens, directly increasing the risk of civilian casualties during ongoing air raids.
To contain the threat posed by the com.red.alertx spyware campaign and prevent further data exfiltration, organizations and affected individuals must implement immediate tactical remediation and long-term strategic defenses.
Given the malware’s comprehensive data-harvesting capabilities, relying solely on standard application uninstallation is insufficient.
Network administrators must immediately block all communication attempts to the threat actor's infrastructure.
To prevent future infections stemming from wartime social engineering and smishing lures: