Investigation reveals evidence of malicious Android packages posing as legitimate Covid-19 contact tracing apps


EclecticIQ, a global provider of cyber threat intelligence (CTI) technology solutions, has teamed up with fraud and cybercrime prevention experts at ThreatFabric to publish the findings of an investigation into instances of threat actors actively pushing malicious Android packages disguised as legitimate contact tracing applications.

Key analysis points by ThreatFabric and EclecticIQ reveal that:

  • Threat actors have been disguising Android packages as legitimate government-backed contact tracing applications for financial gain.
  • There is evidence to suggest that actors have used repackaged commodity and open-source malware to lower the investment required in the observed campaigns.
  • Third-party port forwarding, and secure tunnelling services have probably been used to provide anonymisation to command and control (C2) infrastructure.
  • The Android packages were probably delivered through links pointing to phishing pages.


The findings of the report suggest that threat actors will almost certainly continue to use commodity and open source-based malware disguised as legitimate contact tracing applications for financial gain. The low barrier to entry provided by these tools and the continued rollout of contact tracing applications by nations, presents continued financial opportunity for cybercriminals into the near future. Malicious actors have shown their willingness to exploit the current pandemic by targeting legitimate contact tracing applications consistently in recent months. Samples analysed by EclecticIQ and ThreatFabric researchers had an earliest estimated build time of April 12th, 2020 with the latest being June 23rd, 2020.

Peter Ferguson, cyber threat intelligence specialist at EclecticIQ’s Fusion Center commented:

“Users should never download contact tracing android applications from links sent to them or from third party stores. If they are interested in downloading their nation’s contact tracing application, they should use the official site or the Google Play Store.”

Gaetan van Diemen, General Manager at ThreatFabric commented:

“Threat actors have become very efficient in tricking users into downloading and installing a phenomenal variety of malicious apps on their mobile devices. To avoid fraud and brand or reputation damage, we strongly recommend app developers and online service providers to adapt their security strategy based on the factual evolution of the mobile threat landscape.