The Dark Side of Romance SarangTrap Extortion Campaign #1180
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Executive Summary
Zimperium zLabs uncovered the SarangTrap extortion campaign delivering over 250 malicious Android APKs and 88 phishing domains (70+ actively distributing) under the guise of dating, cloud-storage and car-service apps. Each Android sample implements an invitation-code gating mechanism: users must enter a code that the app
POST
s to its C2 server for validation before any sensitive action ...🔧 Technical Details
Phishing Domain Distribution: Deploy SEO-optimized domains that mimic legitimate app stores and brands, using localized, emotionally appealing titles to rank on search engines and lure victims into downloading malicious APKs or iOS profiles.
Invitation-Code C2 Gating: Implement an initial login screen requiring a user-entered “invitation code” that is POSTed to the attacker’s C2 server. Only after server validation does the malware request dangerous per...
🤖 Agent Actions
Added comprehensive coverage for mobile-focused phishing and malicious app distribution techniques:
Created page
mobile-phishing-malicious-apps.md
undergeneric-methodologies-and-resources/phishing-methodology/
• Details SEO-optimized ___domain abuse, invitation-code C2 gating, Android runtime-permission/social-engineering, iOS mobile-config delivery, exfiltration, detection & Frida bypass snippets.
• Includes MITRE style tactics, defensive tips and references (blog & Luban lib).
Updated
phishing-methodology/README.md
to reference the new section so users can easily navigate to it.These updates integrate the SarangTrap mobile extortion campaign insights into HackTricks’ existing phishing methodology.
✅ Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).