New Mandrake Malware: A Growing Threat to Android Users

Mandrake Malware

Security researchers have recently uncovered a new version of Mandrake, a highly sophisticated Android spyware tool. This dangerous malware was first analyzed by Bitdefender in May 2020, revealing that it had been operating undetected for at least four years. In April 2024, Kaspersky researchers identified suspicious samples which were later confirmed to be an updated version of Mandrake. This discovery marks a significant development in the ongoing battle against cyber-espionage tools.

Hidden in Popular Apps

The latest variant of Mandrake was found hidden within five applications on Google Play, spanning from 2022 to 2024. These applications managed to amass over 32,000 downloads while remaining undetected by other cybersecurity vendors. The most downloaded app, named AirFS, accumulated over 30,000 installations before it was removed from the platform in March 2024. This highlights the malware’s ability to infiltrate widely used apps and evade detection for an extended period.

Advanced Evasion Techniques

Kaspersky’s advisory detailed how the new Mandrake samples have significantly enhanced their obfuscation and evasion tactics. One key change is the relocation of malicious functions to obfuscated native libraries, which makes them much harder to analyze compared to previous versions. Additionally, the malware now employs certificate pinning to secure its communications with command-and-control (C2) servers. This ensures that data transmissions remain hidden from prying eyes.

Moreover, Mandrake has incorporated various tests to avoid detection on rooted or emulated devices. These include checks for the presence of analyst tools and specific system characteristics that could indicate a virtual environment. These sophisticated evasion techniques make it increasingly challenging for cybersecurity experts to detect and analyze the malware effectively.

Multi-Stage Infection Chain

From a technical standpoint, the new Mandrake version operates through a complex, multi-stage infection chain. Initially, malicious activity is concealed within a native library, which makes it harder to analyze than previous campaigns where the first stage was embedded in the DEX file. Upon execution, this first-stage library decrypts and loads the second stage, which then initiates communication with the C2 server.

If the C2 server deems the device relevant, it commands the device to download and execute the core malware. This core malware is designed to steal user credentials and deploy additional malicious applications, thereby expanding its reach and impact. The infection chain’s multi-stage nature makes it a formidable threat, as each stage adds an additional layer of complexity and evasion.

Enhanced Evasion and Encryption

Mandrake’s evasion techniques have become more sophisticated with each iteration. The malware now includes advanced checks for emulation environments, rooted devices, and the presence of analyst tools. These enhancements make it extremely challenging for cybersecurity experts to detect and analyze the malware. Furthermore, the threat actors behind Mandrake have employed a novel approach to data encryption and decryption, utilizing a mix of custom algorithms and standard AES encryption.

Impact on the Cybersecurity Landscape

The discovery of this new Mandrake variant underscores the evolving nature of cybersecurity threats. Kaspersky’s findings highlight that the Mandrake spyware is continuously improving its methods of concealment, sandbox evasion, and bypassing new defense mechanisms. This ongoing evolution makes it increasingly difficult for cybersecurity measures to keep pace with the threat.

Kaspersky’s advisory emphasized the formidable skills of the threat actors behind Mandrake, noting that the applications in the first campaign went undetected for four years, while the current campaign lurked in the shadows for two years while still available for download on Google Play. This situation underscores the need for stricter controls and more rigorous vetting processes for applications before they are published in official marketplaces.

Implications for Users and Developers

The presence of such sophisticated malware on a widely trusted platform like Google Play raises significant concerns for both users and developers. Users need to be more vigilant about the apps they download, ensuring they come from trusted sources and are regularly updated. Developers, on the other hand, must implement more robust security measures in their applications to prevent them from being exploited by malicious actors.

The discovery of the new Mandrake variant is a stark reminder of the ongoing challenges in the cybersecurity landscape. As threat actors become more sophisticated, the need for robust and adaptive security measures becomes ever more critical. It is essential for users to stay vigilant, keep their devices updated, and only download apps from trusted sources. By understanding the nature of these threats and how they operate, both users and cybersecurity professionals can better protect against the evolving landscape of digital threats.

The battle against cyber-espionage tools like Mandrake is far from over, and continuous efforts are needed to stay ahead of these sophisticated threats. Enhanced security measures, user awareness, and rigorous app vetting processes are crucial in safeguarding against such malicious activities.


Subscribe to Our Newsletter

Related Articles

Top Trending

Tokenizing the World: The Rise of Real World Assets (RWA) in 2026
Tokenizing the World: The Rise of Real World Assets (RWA) in 2026
Lab Grown Eel
Lab-Grown Eel: Japanese Food Tech Breakthrough Hits Sushi Markets
Leading in the Age of Agents How to Manage Digital Employees
Leading in the Age of Agents: How to Manage Digital Employees
UK Sovereign AI Compute
UK’s “Sovereign AI” Push: Sunak Pledges £500M for Public Sector Compute
Dhaka Fintech Seed Funding
Dhaka’s Startup Ecosystem: 3 Fintechs Securing Seed Funding in January

LIFESTYLE

Travel Sustainably Without Spending Extra featured image
How Can You Travel Sustainably Without Spending Extra? Save On Your Next Trip!
Benefits of Living in an Eco-Friendly Community featured image
Go Green Together: 12 Benefits of Living in an Eco-Friendly Community!
Happy new year 2026 global celebration
Happy New Year 2026: Celebrate Around the World With Global Traditions
dubai beach day itinerary
From Sunrise Yoga to Sunset Cocktails: The Perfect Beach Day Itinerary – Your Step-by-Step Guide to a Day by the Water
Ford F-150 Vs Ram 1500 Vs Chevy Silverado
The "Big 3" Battle: 10 Key Differences Between the Ford F-150, Ram 1500, and Chevy Silverado

Entertainment

Netflix Vs. Disney+ Vs. Max- who cancelled more shows in 2025
Netflix Vs. Disney+ Vs. Max: Who Cancelled More Shows In 2025?
global Netflix cancellations 2026
The Global Axe: Korean, European, and Latin American Netflix Shows Cancelled in 2026
why Netflix removes original movies featured image
Deleted Forever? Why Netflix Removes Original Movies And Where The “Tax Break” Theory Comes From
can fans save a Netflix show featured image
Can Fans Save A Netflix Show? The Real History Of Petitions, Pickups, And Comebacks
Netflix shows returning in 2026 featured image
Safe For Now: Netflix Shows Returning In 2026 That Are Officially Confirmed

GAMING

The Death of the Console Generation Why 2026 is the Year of Ecosystems
The Death of the Console Generation: Why 2026 is the Year of Ecosystems
Pocketpair Aetheria
“Palworld” Devs Announce New Open-World Survival RPG “Aetheria”
Styx Blades of Greed
The Goblin Goes Open World: How Styx: Blades of Greed is Reinventing the AA Stealth Genre.
Resident Evil Requiem Switch 2
Resident Evil Requiem: First Look at "Open City" Gameplay on Switch 2
High-performance gaming setup with clear monitor display and low-latency peripherals. n Improve Your Gaming Performance Instantly
Improve Your Gaming Performance Instantly: 10 Fast Fixes That Actually Work

BUSINESS

Leading in the Age of Agents How to Manage Digital Employees
Leading in the Age of Agents: How to Manage Digital Employees
Dhaka Fintech Seed Funding
Dhaka’s Startup Ecosystem: 3 Fintechs Securing Seed Funding in January
Quiet Hiring Trend
The “Quiet Hiring” Trend: Why Companies Are Promoting Internally Instead of Hiring in Q1
Pharmaceutical Consulting Strategies for Streamlining Drug Development Pipelines
Pharmaceutical Consulting: Strategies for Streamlining Drug Development Pipelines
IMF 2026 Outlook Stable But Fragile
Global Economic Outlook: IMF Predicts 3.1% Growth but "Downside Risks" Remain

TECHNOLOGY

UK Sovereign AI Compute
UK’s “Sovereign AI” Push: Sunak Pledges £500M for Public Sector Compute
Netflix shows returning in 2026 featured image
Safe For Now: Netflix Shows Returning In 2026 That Are Officially Confirmed
Grok AI Liability Shift
The Liability Shift: Why Global Probes into Grok AI Mark the End of 'Unfiltered' Generative Tech
GPT 5 Store leaks
OpenAI’s “GPT-5 Store” Leaks: Paid Agents for Legal and Medical Advice?
Pocketpair Aetheria
“Palworld” Devs Announce New Open-World Survival RPG “Aetheria”

HEALTH

Apple Watch Anxiety Vs Arrhythmia
Anxiety or Arrhythmia? The New Apple Watch X Algorithm Knows the Difference
Polylaminin Breakthrough
Polylaminin Breakthrough: Can This Brazilian Discovery Finally Reverse Spinal Cord Injury?
Bio Wearables For Stress
Post-Holiday Wellness: The Rise of "Bio-Wearables" for Stress
ChatGPT Health Medical Records
Beyond the Chatbot: Why OpenAI’s Entry into Medical Records is the Ultimate Test of Public Trust in the AI Era
A health worker registers an elderly patient using a laptop at a rural health clinic in Africa
Digital Health Sovereignty: The 2026 Push for National Digital Health Records in Rural Economies