SpyMax is a Remote Administration Tool (RAT) used by threat actors to exploit Android devices, particularly targeting Telegram users. It masquerades as the Telegram app, and once installed, it requests the user to enable the Accessibility Service. With these permissions, SpyMax acts as a keylogger and collects personal data such as keystrokes, location details, and device movement. This data is then compressed and sent to a Command and Control (C2) server. The C2 server sends back system commands and additional payloads to the infected device, compromising the user's data integrity and confidentiality.
Steps of the Attack
Actions to Avoid the Attack
Source and further reading.
S, B. (2024, June 25).
SpyMax - An Android RAT targets Telegram Users - K7 Labs. K7 Labs.
https://labs.k7computing.com/index.php/spymax-an-android-rat-targets-telegram-users/
Fkie, F. (n.d.).
SpyMax (Malware Family).
https://malpedia.caad.fkie.fraunhofer.de/details/apk.spymax
Reporters, F. (2024, June 16).
2 Malaysians linked to ‘Trojan Spymax’ scam extradited to Singapore. Free Malaysia Today.
https://www.freemalaysiatoday.com/category/nation/2024/06/16/2-msians-linked-to-trojan-spymax-scam-extradited-to-singapore/