Indian Hacking Group Unleashes Tanzeem: New Android Spyware Masquerading as Chat App

Indian Hacking Group Unleashes Tanzeem: New Android Spyware Masquerading as Chat App

DoNot Team Deploys New Android Malware in Targeted Cyber Attacks

Cybersecurity firm Cyfirma has discovered a new Android malware campaign linked to the DoNot Team threat actor. The malware, named Tanzeem (“organization” in Urdu) and Tanzeem Update, was identified in late 2024.

The malicious apps masquerade as chat applications but become non-functional after installation and permission grants. Both variants share similar functionalities with minor UI differences.

DoNot Team, also known as APT-C-35, Origami Elephant, SECTOR02, and Viceroy Tiger, is believed to be of Indian origin. The group has a history of using spear-phishing and Android malware for intelligence gathering operations.

Key Technical Features:
– Leverages OneSignal platform for push notification delivery
– Requests extensive device permissions
– Collects sensitive data including:
– Call logs
– Contacts
– SMS messages
– Location data
– Account information
– External storage files
– Captures screen recordings
– Establishes C2 server connections

The malware employs a sophisticated persistence mechanism through push notifications, prompting users to install additional malicious components. While specific targets remain unclear, the campaign appears focused on gathering intelligence against internal threats in Pakistan and Afghanistan.

This development follows the group’s earlier deployment of the Firebird backdoor in October 2023, demonstrating their continued evolution in cyber espionage capabilities.

Share This Article