{"id":22072,"date":"2023-11-16T08:47:20","date_gmt":"2023-11-16T13:47:20","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=22072"},"modified":"2023-11-24T20:37:15","modified_gmt":"2023-11-24T16:37:15","slug":"whatsapp-mods-canesspy","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/whatsapp-mods-canesspy\/22072\/","title":{"rendered":"WhatsApp mods with spyware"},"content":{"rendered":"<p>Over the past decade, messaging apps such as WhatsApp and Telegram have become an integral part of life for almost every internet user. Billions of people use them to chat with loved ones, share funny pictures and videos with friends, communicate with coworkers, catch up on the news, and so on. Just try to imagine modern life without messengers. Hard, isn\u2019t it? Unfortunately, these indispensable apps sometimes contain hidden threats.<\/p>\n<h2>WhatsApp and Telegram mods: the whats and whys<\/h2>\n<p>\nSome people think that the official WhatsApp and Telegram apps lack functionality \u2014 be that additional options to customize the interface or something more specific; for example, the ability to hide chats, automatically translate messages, or view messages deleted by chat partners. And the list of \u201cmissing\u201d features is a very long one.<\/p>\n<p>Third-party developers create <em>modifications<\/em>, or <em>mods<\/em> of standard WhatsApp and Telegram apps to satisfy even the most peculiar user needs, and there are a great many such mods.<\/p>\n<p>The problem with installing any of them is that the user must entrust their correspondence not only to the original messenger developers but also to the mod developers, who can easily hide malicious modules in them; mod distributors can also add something of their own.<\/p>\n<p>In the case of WhatsApp, the situation with mods is further complicated by its owners. They don\u2019t approve of modifications and so hinder their distribution. From time to time, WhatsApp\u2019s owners <a href=\"https:\/\/techcrunch.com\/2015\/01\/21\/whatsapp-cracks-down-on-third-party-apps-temporarily-bans-their-users-from-its-service\/\" target=\"_blank\" rel=\"nofollow noopener\">try to prohibit folks from using mods<\/a> \u2014 albeit unsuccessfully thus far. Meanwhile they have had some success in barring alternative clients for WhatsApp from the official stores like Google Play and App Store.<\/p>\n<p>As a consequence, users of WhatsApp mods are accustomed to downloading them from just about anywhere. APK files are boldly downloaded, settings are switched to <a href=\"https:\/\/www.kaspersky.com\/blog\/android-most-dangerous-features\/49418\/\" target=\"_blank\" rel=\"noopener nofollow\">allow installation from unknown sources<\/a>, and mods are then run on phones. And cybercriminals exploit this carelessness by embedding malware in the mods.<\/p>\n<p>Our experts <a href=\"https:\/\/securelist.com\/spyware-whatsapp-mod\/110984\/\" target=\"_blank\" rel=\"nofollow noopener\">recently found<\/a> several such infected mods, which we\u2019ll take a look at in this post.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-3\">\n<h2>Infected WhatsApp mods on Telegram<\/h2>\n<p>\nThe WhatsApp mods that caught our experts\u2019 attention hadn\u2019t previously shown any malicious activity. Now, however, they contain a spy module, which <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">our security solutions<\/a> detect as Trojan-Spy.AndroidOS.CanesSpy.<\/p>\n<p>After installation on the victim\u2019s smartphone, an infected WhatsApp mod waits for the phone to be turned on or put on charge before launching the spy module. It contacts one of the C2 servers from the respective list and uploads various information about the device to it, such as phone number, IMEI, cellular network code, and so on. What\u2019s more, the spy Trojan sends information about the victim\u2019s contacts and accounts to the server every five minutes, all the while waiting for commands.<\/p>\n<p>Leaving service commands aside, the spy module\u2019s capabilities are essentially reduced to two functions:<\/p>\n<ul>\n<li>Search the device and send its operators files contained in the smartphone\u2019s memory (to be precise, in its non-system part, or \u201cexternal storage\u201d in Android terminology)<\/li>\n<li>Record sound from the built-in microphone and, as before, send the recordings to C2<\/li>\n<\/ul>\n<p>As for how the spyware was distributed, infected WhatsApp modifications were found in several Arab and Azerbaijani Telegram channels under the names of popular mods: GBWhatsApp, WhatsApp Plus, and AZE PLUS \u2014 a WhatsApp Plus version with the interface translated into Azerbaijani.<\/p>\n<div id=\"attachment_49659\" style=\"width: 2184px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/16175938\/whatsapp-mod-canesspy-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-49659\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/16175938\/whatsapp-mod-canesspy-1.jpg\" alt=\"Infected WhatsApp mods in Telegram channels\" width=\"2174\" height=\"1400\" class=\"size-full wp-image-49659\"><\/a><p id=\"caption-attachment-49659\" class=\"wp-caption-text\">WhatsApp mods infected with spyware were distributed mostly in Azerbaijani and Arabic Telegram channels<\/p><\/div>\n<p>In addition, our experts discovered APK files infected with the spy module on WhatsApp mod download websites.<\/p>\n<p>In October, our security solutions detected and prevented more than 340,000 attacks by this spyware in more than 100 countries. Note that we\u2019re talking about attacks intercepted by our solutions. The total number (accounting for phones on which our solutions aren\u2019t installed) is likely much higher.<\/p>\n<p>Although the geographic spread of the threat is extensive, the largest number of infection attempts \u2014 by a wide margin \u2014 was registered in Azerbaijan, followed by several Arab countries: Yemen, Saudi Arabia, and Egypt; as well as Turkey.<\/p>\n<div id=\"attachment_49658\" style=\"width: 1510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/16175953\/whatsapp-mod-canesspy-2-EN.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-49658\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/11\/16175953\/whatsapp-mod-canesspy-2-EN.jpg\" alt=\"Geography of infection attempts by Trojan-Spy.AndroidOS.CanesSpy\" width=\"1500\" height=\"1393\" class=\"size-full wp-image-49658\"><\/a><p id=\"caption-attachment-49658\" class=\"wp-caption-text\">Top-20 countries where WhatsApp spy mods were distributed<\/p><\/div>\n<h2>How to protect yourself against messenger spyware<\/h2>\n<p>\nThis isn\u2019t the first case in 2023 of malicious modules being found in modified messenger apps. A few months ago we wrote about a <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-signal-malware-in-google-play\/48937\/\" target=\"_blank\" rel=\"noopener nofollow\">string of infected mods for Telegram, WhatsApp, and even the secure messenger Signal<\/a>. So there\u2019s every reason to remain vigilant:<\/p>\n<ul>\n<li>Use only the official WhatsApp and Telegram apps. As we\u2019ve seen, messenger mods are prone to malware.<\/li>\n<li>Install apps only from official stores: Apple App Store, Google Play, Huawei AppGallery, and the like. These aren\u2019t immune to malware, but still way safer than third-party websites, which often have no security measures in place at all.<\/li>\n<li>Before installing any app, first study its page in the store and make sure it\u2019s not fake \u2014 bad actors often create clones of popular apps.<\/li>\n<li>Read user reviews of the app, paying special attention to negative ones. There you\u2019ll probably find out if it demonstrates suspicious activity.<\/li>\n<li>Be sure to install <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a> on all your devices. This will detect malicious code inside a seemingly harmless app, and warn you in time.<\/li>\n<li>Remember that in the free version of our <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a> app, you have to run the scan manually.<\/li>\n<li>If you use the premium version of our protection for Android \u2014 which comes included in the <a href=\"https:\/\/me-en.kaspersky.com\/standard?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kstand___\" target=\"_blank\" rel=\"noopener\">Kaspersky Standard<\/a>, <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Plus<\/a>, and <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> subscriptions \u2014 you can sit back and relax: scanning for threats takes place automatically.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Our researchers discovered spyware-infected WhatsApp modifications distributed through Telegram channels and websites with WhatsApp mods.<\/p>\n","protected":false},"author":2706,"featured_media":22075,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[105,577,43,97,682,738,581,521,692,520],"class_list":{"0":"post-22072","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-messengers","10":"tag-privacy","11":"tag-security-2","12":"tag-spyware","13":"tag-surveillance","14":"tag-telegram","15":"tag-threats","16":"tag-trojans","17":"tag-whatsapp"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/whatsapp-mods-canesspy\/22072\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/whatsapp-mods-canesspy\/26647\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/whatsapp-mods-canesspy\/11203\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/whatsapp-mods-canesspy\/29397\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/whatsapp-mods-canesspy\/26932\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/whatsapp-mods-canesspy\/26857\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/whatsapp-mods-canesspy\/29405\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/whatsapp-mods-canesspy\/28233\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/whatsapp-mods-canesspy\/36561\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/whatsapp-mods-canesspy\/11874\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/whatsapp-mods-canesspy\/49656\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/whatsapp-mods-canesspy\/21253\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/whatsapp-mods-canesspy\/22022\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/whatsapp-mods-canesspy\/30701\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/whatsapp-mods-canesspy\/35346\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/whatsapp-mods-canesspy\/27190\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/whatsapp-mods-canesspy\/32923\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/whatsapp-mods-canesspy\/32573\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22072"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22072\/revisions"}],"predecessor-version":[{"id":22113,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22072\/revisions\/22113"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22075"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}