Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
Home/Threats/Hackers Deploy Android Malware via Fake ChatGPT Invites
Threats

Hackers Deploy Android Malware via Fake ChatGPT Invites

Cybercriminals are targeting Android users with a sophisticated phishing scheme, deploying malicious applications disguised as beta-testing opportunities for popular AI tools like Following the iOS...

David kimber
David kimber
March 24, 2026 3 Min Read
0 0

Cybercriminals are targeting Android users with a sophisticated phishing scheme, deploying malicious applications disguised as beta-testing opportunities for popular AI tools like

Following the iOS phishing campaign, threat actors are now targeting #Android users with invitation emails to test fake #ChatGPT and #Meta advertising apps. These messages push malicious apps delivered through “[email protected]” via Firebase App Distribution, a… https://t.co/Q8wm8s4Z16 pic.twitter.com/rW215aL9FU

— SpiderLabs (@SpiderLabs) March 23, 2026

Since the email originates from a real Google service address, most recipients have no reason to question its legitimacy.

These messages ask users to test what appear to be early-access versions of ChatGPT and Meta advertising apps for Android, and clicking through leads to the installation of malicious APK files outside the official Play Store.

SpiderLabs analysts at LevelBlue identified this Android-targeting campaign as a direct continuation of an earlier phishing operation that had gone after iOS users.

In that prior campaign, attackers impersonated ChatGPT and Google Gemini to push fake applications onto Apple devices through the App Store.

With Android now firmly in the crosshairs, the threat actors appear to be running a coordinated, cross-platform operation designed to cast the widest possible net across the global mobile user base.

Firebase test invitations (Source - SpiderLabs)
Firebase test invitations (Source – SpiderLabs)

The campaign came to public attention in late March 2026, and the malicious package names tied to the operation include com.OpenAIGPTAds, com.opengpt.ads, and com.meta.adsmanager.

These package identifiers are built to resemble plausible names for AI-driven advertising tools, making them harder to question without a closer look.

Once installed, the apps present what appears to be a real Facebook login page, prompting the user to enter their credentials.

The final goal is account takeover, giving attackers access to Facebook business and advertising accounts that can be used for unauthorized ad campaigns or broader data theft.

How Firebase App Distribution Becomes the Attack Pipeline

The most technically striking aspect of this campaign is how it turns Firebase App Distribution into a delivery mechanism for malware.

Firebase App Distribution is a service by Google that lets developers send test builds of their apps to a small group of users ahead of a full public release.

People who regularly participate in app testing are conditioned to trust these invitation emails, and the attackers exploit precisely that habit.

The phishing emails look indistinguishable from a genuine developer invite, giving recipients no obvious visual clue that something is wrong.

By routing delivery through an established Google channel, attackers sidestep two red flags that careful users typically watch for: a suspicious sender address and an unofficial download link.

Since the email arrives from [email protected] and the app comes through Google’s own distribution infrastructure, neither the email client’s spam filter nor the user’s natural instincts are likely to raise an alarm.

The apps install outside the Play Store, bypassing Google’s review process entirely, which allows malicious behavior to reach the device unchecked.

SpiderLabs researchers further identified several malicious email domains actively supporting this campaign, including thcsmyxa-nd[.]com, moitasec[.]com, tourmini[.]site, ocngongiare[.]com, disanviet[.]homes, and itrekker[.]space.

Security teams and individuals should treat these as active indicators of compromise and block them at the network level without delay.

Android users should treat any unsolicited app-testing invitation with real caution, even those that appear to come from Google addresses. Applications should only be downloaded from the official Google Play Store.

Users should never enter Facebook credentials inside an app that was not downloaded through a trusted, verified channel.

Network administrators and security teams are advised to block the identified malicious domains immediately, and organizations should ensure their staff members are well informed about this specific and increasingly common form of social engineering.

 

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwarephishingSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Secure 511K+ Exposed End-of- End-of-Life Microsoft

Next Post

Chrome Security Update Fixes 8 Remote Code Execution Flaws

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us