For those who use messaging apps within the United Arab Emirates (UAE), cybersecurity researchers at ESET have recognized two cell adware campaigns that trick customers into putting in faux variations of Sign and ToTok, then steal private information, together with contacts, messages, backups, information, and extra from contaminated units.
One malware pressure, known as, known as ProSpy (Android/Spy.ProSpy), was supplied as a faux Sign “encryption plugin” and as a ToTok Professional add-on. The opposite, ToSpy (Android/Spy.ToSpy), impersonates ToTok itself. Neither app seems in official app shops; victims need to manually set up APK information from cloned web sites or third-party pages designed to appear to be official providers.
Sign, as we all know, is a well-liked encrypted messaging app. ToTok, alternatively, has a controversial historical past. As reported by Hackread.com in December 2019, ToTok was a UAE-developed messaging app accused of spying on customers within the nation, which led Apple and Google to take away it from their shops. At present, the app is obtainable solely by way of unreliable third-party sources.
The malware rip-off is an ideal instance of a social engineering assault utilizing folks’s belief in recognised manufacturers, copying their logos, onboarding screens and retailer layouts. In accordance with ESET’s lengthy technical weblog put up, in some instances, the faux Sign app even adjustments its icon and identify to appear to be Google Play Companies after setup, which makes it more durable for customers to identify and take away.
When the adware runs, it asks for permissions that many apps legitimately want, like contacts and storage entry. If granted, the adware collects system particulars, SMS messages, contact lists, put in app lists, and information, together with chat backups.
ToSpy was noticed concentrating on ToTok backup information particularly, which suggests the attackers are eager about chat historical past. All collected information is encrypted with a hardcoded AES key, then despatched to command and management servers.
ESET’s analysis exhibits that this isn’t a brand new operation. The corporate’s telemetry and area information hint samples again so far as mid-2022, with ongoing exercise and energetic C&C servers detected in 2025.
To cut back threat, customers ought to follow official app shops, keep away from enabling set up from unknown sources, and preserve Google Play Defend turned on if their system helps it. ESET has shared its findings with Google, and Play Defend now blocks identified variants of those adware households by default on Android units with Google Play Companies.







