Close Menu
AI Security Weekly
  • Artificial Intelligence
  • Cybersecurity
  • Threats & Breaches
  • Privacy & Policy
  • Tools
  • Trends & Research
  • MSP MSSP
  • Blogs & Insights

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Crafting a Robust SOC Automation Plan

May 15, 2025

SoundCloud CEO Addresses Concerns About AI Policy

May 15, 2025

Cybersecurity Sector Secures $1.7 Billion for Advanced Protection Innovations

May 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
AI Security WeeklyAI Security Weekly
Subscribe
  • Artificial Intelligence
  • Cybersecurity
  • Threats & Breaches
  • Privacy & Policy
  • Tools
  • Trends & Research
  • MSP MSSP
  • Blogs & Insights
AI Security Weekly
Home » Tanzeem Android Malware Poses Threat to Intelligence Gathering
Threats and Breaches

Tanzeem Android Malware Poses Threat to Intelligence Gathering

ContributorBy ContributorApril 27, 2025No Comments3 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Tanzeem android malware poses threat to intelligence gathering
Share
Facebook Twitter LinkedIn Pinterest Telegram Email

Jan 20, 2025Ravie LakshmananAndroid / Malware

New Android Malware Linked to DoNot Team

The hacking group known as the DoNot Team has been associated with a new strain of malware targeting Android devices, contributing to highly focused cyber assaults.

Malware Overview

Two pieces of malware, identified as Tanzeem (which translates to “organization” in Urdu) and Tanzeem Update, were discovered by the cybersecurity firm Cyfirma in October and December of 2024. Both apps exhibit similar functionalities, with minor variations in their user interfaces.

Malfunctioning Chat Application

According to Cyfirma’s analysis, although the application is designed to function as a chat service, it crashes upon installation after necessary permissions are granted. The naming of the app implies that its creators may have aimed at targeting specific individuals or groups, both domestically and internationally.

Background of DoNot Team

Also recognized as APT-C-35, Origami Elephant, SECTOR02, and Viceroy Tiger, the DoNot Team is a reputed hacking collective thought to originate from India. The group has a history of employing spear-phishing tactics and Android malware to extract sensitive information from targeted victims.

Targeted Individuals and Intentions

While the precise targets of this latest malware campaign remain unclear, it is suspected that it is aimed at specific individuals for intelligence-gathering purposes related to internal threats. The app’s use of OneSignal, a well-known customer engagement framework, raises concerns that it may be exploited to deliver phishing notifications that lead to malware installation.

Malware Features and Techniques

The malicious Android application presents a deceptive chat interface and entices users to click a “Start Chat” button, which then prompts them to grant access to the accessibility services API. This access enables the app to conduct various harmful activities, including gathering sensitive information such as call logs, contact lists, SMS messages, precise location data, and external storage files. Additionally, the app has capabilities for screen recording and establishing connections to command-and-control servers.

Enhancing Malware Persistence

According to Cyfirma, the discovered malware employs a new strategy involving push notifications that encourage users to install further Android malware, thereby ensuring its ongoing presence on the device. This tactic reflects the threat group’s evolving objectives in collecting intelligence for national interests.

Google’s Response

In response to the findings, a spokesperson from Google stated that there are currently no known instances of this malware available on Google Play. Users are safeguarded by Google Play Protect, which automatically activates on Android devices with Google Play Services. This feature can alert users and block apps exhibiting malicious behavior, regardless of their source.

Android Gathering Intelligence Malware Poses Tanzeem Threat
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
contact
Contributor

Related Posts

Unlocking Yellowstone’s Wolf Populations with Artificial Intelligence

May 8, 2025

Emerging Trends in Cybersecurity: The Impact of Artificial Intelligence

May 8, 2025

Essential Insights on Cybersecurity Threats, Tools, and Best Practices

May 5, 2025

Essential Cybersecurity Threats, Strategies, and Insights

May 5, 2025

Old D-Link Vulnerabilities Open Doors for Global Attacks by FICORA and Kaiten Botnets

May 2, 2025

Targets in Russia Exceed 80% Success Rate

May 2, 2025

Comments are closed.

Top Reviews
We're Social
  • Facebook
  • Twitter
  • Instagram
  • LinkedIn
Editors Picks

Crafting a Robust SOC Automation Plan

May 15, 2025

SoundCloud CEO Addresses Concerns About AI Policy

May 15, 2025

Cybersecurity Sector Secures $1.7 Billion for Advanced Protection Innovations

May 15, 2025

Creating a Trust Layer for AI and Web3: Insights from Polyhedra

May 15, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

About Us
About Us

At AI Security Weekly, we are dedicated to delivering the latest news, insights, and analysis on artificial intelligence security. As AI technologies continue to evolve, so do the threats, vulnerabilities, and solutions that shape the cybersecurity landscape. Our mission is to keep security professionals, researchers, and tech enthusiasts informed about the rapidly changing world of AI-driven security risks and defenses.

Trends

Crafting a Robust SOC Automation Plan

May 15, 2025

Sophos Launches MSP Elevate to Drive Partner Success

May 15, 2025

ManageEngine Unveils AI Innovations for Enhanced PAM Solutions

May 11, 2025
Don't Miss

Crafting a Robust SOC Automation Plan

May 15, 2025

SoundCloud CEO Addresses Concerns About AI Policy

May 15, 2025

Cybersecurity Sector Secures $1.7 Billion for Advanced Protection Innovations

May 15, 2025
© 2025 AI Security Weekly. All Rights Reserved.
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.