{"id":25054,"date":"2019-02-08T13:28:02","date_gmt":"2019-02-08T13:28:02","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29805\/Android-Spyware-Poses-As-Privacy-Tool-To-Trick-You-Into-Downloading.html"},"modified":"2019-02-08T13:28:02","modified_gmt":"2019-02-08T13:28:02","slug":"android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/","title":{"rendered":"Android Spyware Poses As Privacy Tool To Trick You Into Downloading"},"content":{"rendered":"<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>A powerful form of Android malware with spy capabilities has re-emerged with new tactics \u2014 this time masquerading as a popular online privacy application to trick users into downloading it.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/android-spyware-malware-records-calls-and-sends-your-pictures-to-hackers\/\">First uncovered in August last year<\/a>, Triout malware collects vast amounts of information about victims by recording phone calls, monitoring text communications, stealing photos, taking photos, and even collecting GPS information from the device, allowing the user&#8217;s location to be tracked.\u00a0<\/p>\n<p>The campaign has been active since May last year, with users previously duped into downloading the malware with a fake version of an adult app \u2014 but now those behind Triout have altered their tactics, distributing the malware with a re-purposed version of a legitimate privacy tool that has been ripped from the Google Play store.<\/p>\n<p>This new means of distributing Triout has been detailed by <a href=\"https:\/\/labs.bitdefender.com\/2019\/02\/triout-android-spyware-framework-makes-a-comeback-abusing-app-with-50-million-downloads\/\" target=\"_blank\" rel=\"noopener noreferrer\">researchers at security company Bitdefender<\/a>, who were also responsible for first uncovering the malware last year.<\/p>\n<p><strong>SEE: <a href=\"https:\/\/www.zdnet.com\/article\/what-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\/\">What is malware? Everything you need to know about viruses, trojans and malicious software<\/a><\/strong><\/p>\n<p>Now Triout is being hidden in a phony version of Psiphon, a privacy tool that is designed to help users bypass censorship on the internet. Psiphon is particularly focused towards aiding users living under repressive regimes and its services have been downloaded millions of times \u2014 the version available in the official Google Play store boasts over 10 million installations.<\/p>\n<p>The tool can also be downloaded from third-party sites, especially in places that don&#8217;t have access to Google Play, and it&#8217;s this, combined with the function and popularity of Psiphon, which is likely to have made it an appealing lure for the hacking operation behind Triout.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Those behind Triout have been careful to make sure the phony version of Psiphone looks and acts in the same way as the real thing, so they can conduct the campaign without raising the suspicion of victims.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2019\/02\/08\/167dce87-bd37-4a03-95ab-393fadfc1c4b\/resize\/470xauto\/3652ab9ea5e9af299ccc33e4bf40fbe0\/triout-android-spyware-framework-makes-a-comeback-abusing-app-with-50-million-downloads-1.png\" class=\"\" alt=\"triout-android-spyware-framework-makes-a-comeback-abusing-app-with-50-million-downloads-1.png\" height=\"auto\" width=\"470\"\/><\/span><\/p>\n<p><span class=\"caption\">The malicious version of the app (left) compared with the real version (right).<\/span><\/p>\n<p><span class=\"credit\">Image: Bitdefender<\/span><\/p>\n<p>The updated Triout follows in the footsteps of the initial campaign, appearing to very selective when targeting victims. Researchers uncovered the malware running on seven devices, with five of those in South Korea and Germany. Previous campaigns appeared to focus on Israel.<\/p>\n<p>It&#8217;s still uncertain how the attackers ensure that their selected victims are duped into downloading the malware, but it potentially involves spear-phishing.<\/p>\n<p>&#8220;Whether they used social engineering techniques to trick the victims into installing the app from third-party marketplaces or prepared an online campaign directly targeted at a limited number of users, it&#8217;s uncertain at this point how victims have been selected, targeted, and infected,&#8221; Liviu Arsene, senior e-threat analyst at Bitdefender told ZDNet.<\/p>\n<p><strong>SEE:\u00a0<a href=\"http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/?ftag=CMG-01-10aaa1b#link=%7B%22linkText%22:%22A%20winning%20strategy%20for%20cybersecurity%22,%22target%22:%22%22,%22href%22:%22http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/?ftag=CMG-01-10aaa1b%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D\">A winning strategy for cybersecurity<\/a>\u00a0(ZDNet special report) |\u00a0<a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/a-winning-strategy-for-cybersecurity-free-pdf\/?ftag=CMG-01-10aaa1b#link=%7B%22linkText%22:%22Download%20the%20report%20as%20a%20PDF%22,%22target%22:%22%22,%22href%22:%22https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/a-winning-strategy-for-cybersecurity-free-pdf\/?ftag=CMG-01-10aaa1b%22,%22role%22:%22standard%22,%\" target=\"_blank\" rel=\"noopener noreferrer\">Download the report as a PDF<\/a>\u00a0(TechRepublic)<\/strong><\/p>\n<p>It isn&#8217;t just the lure which has changed \u2014 researchers note that the command and control server the attackers use to extract data from compromised devices has changed to an IP address in France. In addition to this, previously analysed samples of Triout had been submitted from Russia, while the latest version has been uploaded from the US.<\/p>\n<p>This subterfuge around the origin of the malware means it still isn&#8217;t possible to identify the origin of the campaign or the group behind it, but what is certain is that Triout remains an extremely powerful hacking tool that provide attackers with vast amounts of information.<\/p>\n<p>&#8220;It&#8217;s a potent piece of malware that has been purposely developed for espionage,&#8221; said Arsene.<\/p>\n<p>Researchers believe that the campaign is still active and recommended users do all they can to steer clear of malware threats by keeping their Android operating system up to date and to only install apps from official sources where possible.<\/p>\n<p><strong>READ MORE ON CYBER CRIME<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29805\/Android-Spyware-Poses-As-Privacy-Tool-To-Trick-You-Into-Downloading.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25055,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5773],"class_list":["post-25054","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacymalwarephonefraudgoogle"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Android Spyware Poses As Privacy Tool To Trick You Into Downloading 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Spyware Poses As Privacy Tool To Trick You Into Downloading 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-08T13:28:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading.png\" \/>\n\t<meta property=\"og:image:width\" content=\"470\" \/>\n\t<meta property=\"og:image:height\" content=\"458\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Android Spyware Poses As Privacy Tool To Trick You Into Downloading\",\"datePublished\":\"2019-02-08T13:28:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/\"},\"wordCount\":642,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading.png\",\"keywords\":[\"headline,privacy,malware,phone,fraud,google\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/\",\"name\":\"Android Spyware Poses As Privacy Tool To Trick You Into Downloading 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading.png\",\"datePublished\":\"2019-02-08T13:28:02+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading.png\",\"width\":470,\"height\":458},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,malware,phone,fraud,google\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacymalwarephonefraudgoogle\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Android Spyware Poses As Privacy Tool To Trick You Into Downloading\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Android Spyware Poses As Privacy Tool To Trick You Into Downloading 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/","og_locale":"en_US","og_type":"article","og_title":"Android Spyware Poses As Privacy Tool To Trick You Into Downloading 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-08T13:28:02+00:00","og_image":[{"width":470,"height":458,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Android Spyware Poses As Privacy Tool To Trick You Into Downloading","datePublished":"2019-02-08T13:28:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/"},"wordCount":642,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading.png","keywords":["headline,privacy,malware,phone,fraud,google"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/","url":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/","name":"Android Spyware Poses As Privacy Tool To Trick You Into Downloading 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading.png","datePublished":"2019-02-08T13:28:02+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading.png","width":470,"height":458},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/android-spyware-poses-as-privacy-tool-to-trick-you-into-downloading\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,malware,phone,fraud,google","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacymalwarephonefraudgoogle\/"},{"@type":"ListItem","position":3,"name":"Android Spyware Poses As Privacy Tool To Trick You Into Downloading"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25054"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25054\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25055"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}