6 Android Apps Caught Recording Conversations

Security researchers have found a batch of Android chat apps that secretly harvested users’ messages. The discovery is the latest in a string of privacy scandals to hit popular tech services. The effort, examined by ESET, linked the spyware to a remote access trojan called VajraSpy and found that distribution was mainly focused on users in India and Pakistan, with around 1,400 downloads total.

What researchers uncovered about the VajraSpy campaign

ESET’s probe discovered 12 of these malicious apps in all, six of which landed on Google Play ahead of being flagged. The Play-hosted apps were named Privee Talk, MeetMe, Let’s Chat, Quick Chat, Rafaqat رفاق and Chit Chat. After installation, the apps pushed VajraSpy modules that could carry out broad surveillance, including scraping messages from encrypted chat applications and live recording of ambient sounds.

The PriveTalk logo, featuring the word PriveTalk in white text on a blue speech bubble, set against a professional flat design background with soft blue gradients and subtle patterns.The PriveTalk logo, featuring the word PriveTalk in white text on a blue speech bubble, set against a professional flat design background with soft blue gradients and subtle patterns.
  • Privee Talk
  • MeetMe
  • Let’s Chat
  • Quick Chat
  • Rafaqat رفاق
  • Chit Chat

One related app identified in this broader campaign, WaveChat, stood out for its ability to record background audio even without having been launched—illustrating how aggressively microphone permissions can be misused. The WhatsApp and Signal communication interception enabled with the tools usually involved exploiting Android’s Accessibility Services or notification access to read messages and capture what was on the target’s screen.

Though, for now, Play installs were constrained; the amount of Play capabilities was not. The spyware could also demand sensitive permissions and exfiltrate call logs, contacts, SMS messages, device metadata and files, then stream the data back to attacker-controlled servers. ESET believes the operation to be the work of Patchwork APT, a well-established group famous for social engineering and regional espionage.

Who was targeted in this campaign and how it worked

The operators in that instance, ESET says, relied on honey-trap techniques—posing as friendly chat partners and prodding targets to install “private” messaging apps outside of typical safety guardrails. There were some app store listings and developer information that seemed to be trying to ride the coattails of celebrity, with a name — Mohammad Rizwan — identical with a famous Pakistani cricketer (but not necessarily in common with anyone behind the campaign).

The geographic emphasis was obvious: Victims were predominantly in India and Pakistan. There is no evidence the campaign targeted users in the United States, but the surveillance method — lightweight chat apps uploaded to social networks and app stores and seeded with infection points that can be replicated anywhere — certainly could. ESET has previously reported on such spyware disguises, including lookalike apps impersonating the Signal app and targeting users in the United Arab Emirates.

What those Android chat apps could have accessed

Direct call recording runs into technical and policy barriers on modern Android versions, but spyware can still capture sensitive audio by turning on the microphone, steering the victim to speakerphone or simply making a continuous recording of ambient sound. Paired with Accessibility Services, such tools can read the text of incoming messages, scrape notifications and capture content displayed on screen.

VajraSpy’s permissions footprint resembled that of the common espionage kit: RECORD_AUDIO for audio capture; READ_CONTACTS and READ_SMS to produce a social graph; access to notifications and accessibility services for chat interception, and storage permissions for mining photos, documents, app data caches. Once those permissions are granted, attackers gain “incredible insight into the communications and activities of a person,” Robertson said.

Impact on users and questions for platform oversight

(The existence of any spyware in a mainstream app store raises predictable questions about vetting. Google’s Play Protect has steadily grown, adding real-time scanning for apps sideloaded from other sources and machine-learning testing for signs of misbehavior. The rate of the potentially harmful applications installed on devices that are limited to Play stores is now 0.1%, according to Google, which released its newer security reporting lately.)

A white serif letter P centered on a dark purple background with subtle geometric patterns.A white serif letter P centered on a dark purple background with subtle geometric patterns.

Still, dedicated espionage apps are designed to be benign-looking, shrink their footprint and masquerade themselves as familiar categories such as dating and chat. It’s that camouflage, augmented by some social engineering outside the store, that lets these small actors do damage beyond their size — even if download counts are small.

How to check if your phone is affected and protect it

Look through your installed apps for developer names mentioned by the researchers, Privee Talk, MeetMe and Let’s Chat, Quick Chat [in Persian], Rafaqat رفاق, and Chit Chat. Should you find any, uninstall at once and run the Play Protect scan from the Play Store menu.

Look in Settings under “Review permissions,” then revoke microphone, accessibility, notification access and storage from apps that seriously don’t need it.

Especially noteworthy is any app given Accessibility Services: Many only make such requests as necessary, and very few chat apps ask for it.

Reset passwords for messaging and email accounts, and turn on 2-step verification. In WhatsApp and Signal, examine the active sessions and connected devices, and perhaps reset your security code with contacts you communicate with frequently. If you sideload apps, disable “Install unknown apps” in your browser and file managers.

Return the device to its original settings. If you feel that your phone has sustained significant damage, back up any important files and do a factory reset. Once it is restored, install apps from only trusted developers with long track records and clear privacy policies.

The bottom line on spyware hidden in chat apps

This campaign demonstrates how even when targets don’t fall for the false webmail site, conducting everyday tasks could still yield hundreds of conversations from popular chat applications. “This shows that a convincing chat app can also act as precision spyware in the wrong hands — secretly capturing user information and conversations without the user having any reason to suspect anything is out of the ordinary,” said Ronen Rabinovich, Phantom’s CEO. The download numbers are modest, but the skills are serious. A quick check of your applications and permissions is the best defense — and a reminder that categories you think of as familiar, like “messaging,” deserve extra consideration before you press install.

Source link

Visited 3 times, 3 visit(s) today

Related Article

One of the App Store’s oldest apps gets a dose of Liquid Glass

One of the first titles offered in the App Store, music discovery app Shazam could be installed on the OG iPhone and the iPhone 3G when the App Store launched on July 10th, 2008. Prior to its inclusion in the App Store, Shazam was originally available as a SMS service in the U.K. Users would

As delivery apps boom, town still wrestling with safety and enforcement on the streets

Getting takeout has never been easier. But many Brookline residents say that convenience is increasingly posing a danger to pedestrians and bicyclists. Delivery apps like DoorDash, Uber Eats and Grubhub can bring your favorite restaurants to your doorstep. But some Brookline residents say delivery drivers on mopeds, electric bikes and electric scooters are driving recklessly

Samsung Aims for Five Million Foldables Next Year

Samsung is planning its biggest foldable push yet, with an aim to sell around five million of the Galaxy Z Fold and Flip in 2021, according to a report out of Korea from Maeil Business News passed along by 9to5Google. The initiative also highlights how the industry comes to believe that foldables are emerging from

Motorola Moto G57 and Moto G57 Power Budget Phones Announced

In summary Moto G57 and Moto G57 Power budget phones announced Both use new Snapdragon 6s Gen 4 chip Moto G (2026) and Moto G Play (2026) announced in US Motorola has announced the Moto G57 and Moto G57 Power – two budget phones with some stand-out specifications. It should surprise no-one that the Motorola Moto

Direct Satellite-to-phone Cellular Market to Reach $43.3 Billion by 2034 Globally, at 32.7% CAGR: Allied Market Research

Key factors fueling the growth of the direct satellite-to-phone cellular market include rising demand for ubiquitous mobile connectivity, growing need to provide coverage in remote and disaster-prone areas, and increasing demand for flexible, resilient communication solutions that operate beyond traditional cellular network boundaries. WILMINGTON, Del., Nov. 5, 2025 /PRNewswire/ –Allied Market Research published a report

5 Reasons Why the Motorola Edge 70 is the Super-slim Phone To Buy

The ultra-slim phone dream might be over before it’s properly begun.  Samsung has reportedly already jumped ship, with disappointing sales of the 5.8mm Galaxy S25 Edge causing it to be ditched on the upcoming Galaxy S26 series. Apple isn’t ready to give up just yet, but there are signs that the 5.6mm iPhone Air isn’t

Global EV battery market share in Jan-Sept 2025: CATL 36.6%, BYD 17.9%

CATL and BYD collectively installed 442.2 GWh of EV batteries from January to September 2025, accounting for 54.5 percent of the global total. South Korea’s LG Energy Solution maintained its third-place position with a 9.8 percent market share during the January-September period. CATL (HKG: 3750) and BYD (HKG: 1211) continued to dominate the global electric