DoNot Team Linked to New Tanzeem Android Malware Aimed at Intelligence Gathering


The threat group known as DoNot Team is associated with a new Android malware linked to highly targeted cyber attacks. The malware, identified as Tanzeem (meaning “organization” in Urdu) and its update variant, was discovered by cybersecurity firm Cyfirma in October and December 2024. These applications share nearly identical functionalities, with only slight user interface changes. Cyfirma’s Friday analysis pointed out, “While designed as a chat application, it fails to operate after installation, crashing once the required permissions are granted.” The app’s name indicates a focus on targeting specific individuals or groups both domestically and internationally. DoNot Team, also known as APT-C-35, Origami Elephant, SECTOR02, and Viceroy Tiger, is a hacking group believed to originate from India, notorious for utilizing spear-phishing emails and various Android malware strains in their attacks.

DoNot Team Linked to Emerging Tanzeem Android Malware Targeting Intelligence Gathering

January 20, 2025

In a notable development in the cyber threat landscape, the hacking group known as DoNot Team has been associated with a new strain of Android malware. This malware, identified as Tanzeem, which translates to “organization” in Urdu, is part of a series of sophisticated cyber operations that seem focused on intelligence collection. The cybersecurity firm Cyfirma first detected these malicious artifacts in late 2024, specifically in October and December.

The Tanzeem applications, which also include an update version, share similar functionalities, with only slight variations in their user interfaces. According to Cyfirma’s analysis, while the apps are marketed as chat applications, they fail to function as intended. After the user grants the necessary permissions, the applications abruptly shut down, indicating a potential ruse aimed at collecting sensitive information rather than facilitating legitimate communication.

The primary targets of this malware appear to be specific individuals or groups, both domestically and internationally, suggesting a strategic focus on high-value intelligence assets. The implication is that the DoNot Team is pursuing individuals whose data could offer advantages to their operational objectives.

DoNot Team, which has also been tracked under names such as APT-C-35, Origami Elephant, SECTOR02, and Viceroy Tiger, is believed to operate from India. This group has a history of employing spear-phishing techniques alongside various malware strains, including those targeting the Android platform. Their activities illustrate a clear pattern of initiating access through deceptive means, which aligns with techniques documented in the MITRE ATT&CK framework.

The tactics likely employed in this instance could include initial access methods, achieved through phishing or social engineering strategies. Following this, the persistence of the malware on the infected device might suggest techniques for maintaining footholds within compromised systems. Additionally, possible privilege escalation tactics could enable the attackers to gain more control over the infected devices, augmenting their ability to harvest sensitive data.

As cyber threats continue to evolve, the emergence of Tanzeem serves as a stark reminder for business owners and organizational leaders to remain vigilant. The risks associated with mobile malware, particularly from sophisticated groups like DoNot Team, necessitate robust cybersecurity measures and employee training to mitigate the potential impacts of such targeted attacks. Awareness and preparedness are critical in defending against the increasing complexity of cyber threats that leverage social engineering and advanced malware to exploit vulnerabilities.

Source link