Blog

New Fileless Malware Framework "GhostHook" Targets Android Devices

By iVerify Team

Jul 31, 2024

In recent days, security researchers from iVerify have detected a new fileless malware spreading framework, GhostHook, being shared across cybercrime forums and networks. This framework is designed for distributing malware and other malicious payloads through various methods, such as malicious push popups. It is compatible with multiple operating systems and browsers, making it a useful tool for cybercriminals.

GhostHook operates by allowing users to send a URL to the target. Once the target visits the webpage, a script hooks the browser, maintaining a connection. The hooked browser then communicates with the control panel, turning into a "slave browser." The attacker can then send notifications that mimic system notifications to entice the target into downloading and installing malware or other malicious software.

Key Features

OS Compatibility:

  • Windows

  • Android

  • Linux

  • macOS

Browser Compatibility:

  • Google Chrome

  • Mozilla Firefox

  • Opera Browser

  • Microsoft Edge

Spreadable By:

  • Posting a URL on social media

  • Posting a URL on a forum

  • Sending a URL in an email

  • Sending SMS with a URL in the message

  • Sending WhatsApp/Telegram/XMPP messages with a URL

  • Online QR Codes

  • Physical QR stickers

Additional Features:

  • Visit any website

  • Download any file (direct link)

  • Add to your current website

  • Upload your own HTML for campaigns

  • Upload your own HTML for the landing page

  • Push notifications

  • And much more


Technical Analysis

Social Engineering and Phishing

GhostHook makes it possible for users to spread malware via social engineering. By posting seemingly benign URLs on social media and forums, or sending them via email, SMS, and messaging apps, it tricks users into clicking links. 

These links can lead to credential phishing sites, exploit kits, or initiate drive-by downloads. The framework's capability to integrate with existing websites and create custom HTML landing pages adds to its creativity in making convincing phishing campaigns.




Push Notifications

GhostHook also incorporates push notifications as a method to distribute malicious content. By prompting users to enable notifications on compromised or fake websites, attackers can send persistent alerts to users, urging them to click on malicious links disguised as system updates, security alerts, or account notifications.


A Real-World Scenario

In a real-world scenario, GhostHook could be used for a popup advertising network as follows:

  1. URL Distribution:

    • The attacker sends the client a URL.

    • The client visits the web page containing a script that hooks the browser.

  2. Browser Hooking:

    • The browser communicates with the control panel, becoming a slave browser.

    • The attacker then controls the slave browser.

  3. Push Notifications:

    • The attacker sends notifications that appear as system notifications.

    • These notifications prompt the client to interact with them.

  4. Payload Delivery:

    • The client is urged to download the malware (payload) the attacker wishes to install.

Screenshots of Activity

Note: For a more detailed demonstration of this framework, watch this clip that’s being circulated.

Below are a series of screenshots related to the framework, as well as various discussions about acquiring it. For more experienced readers, BeEF—The Browser Exploitation Framework Project (Beef XSS)—could be compared to GhostHook. However, GhostHook is designed for malicious use and marketed accordingly on cybercrime forums.



Secure Your Mobile Devices with iVerify.io Mobile EDR

iVerify offers advanced mobile EDR solutions that combine threat detection and mobile forensics with automated response and remediation for enterprise-level protection against sophisticated threats, including mobile malware, unpatched vulnerabilities, smishing, and credential theft, ensuring maximum privacy and security.

Take control of your mobile security with iVerify.io. Request a demo to experience our advanced features firsthand at iVerify.io. Secure your devices now.