Love? Actually Fake dating app used as lure in targeted spyw... #1821
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title / context
ESET reports a targeted, multi-platform espionage operation aimed at users in Pakistan (blog dated 28 Jan 2026). The core payload is an Android spyware app dubbed GhostChat (Android/Spy.GhostChat.A) that masquerades as a dating/chat app. The operation expands to Windows via a ClickFix user-assisted execution chain delivering a malicious DLL (Win64/Agent.HEM) and also includes a WhatsApp account takeover via abuse of WhatsApp’s “Lin...
🔧 Technical Details
Hardcoded “authentication” + hardcoded “unlock” gates as a romance-scam credibility layer
A trojan Android app can simulate exclusivity by embedding static credentials and per-feature “unlock codes” directly in the APK (no server validation). The UI pushes victims through a gated flow (login → locked profiles → unlock code) while the malware runs background collection/exfiltration. When each locked item is mapped to an embedded communication endpoint (e.g., fixed WhatsApp numbers), correct codes can trigger an intent redirect into a real messaging app to continue social engineering, keeping victims engaged while ongoing theft continues.
ClickFix (user-assisted execution) to deliver a DLL loader chain
ClickFix lures use fake alerts and step-by-step “fix instructions” to convince users to manually execute malicious actions (download/run). In this case the outcome is execution of a malicious DLL, which then beacons host identity to a C&C URL and e...
🤖 Agent Actions
Updated phishing-methodology/README.md with new ClickFix tradecraft details (rundll32 DLL chain, hidden/base64 PowerShell tasking and hunting cues), expanded mobile phishing coverage to include the romance-gated GhostChat APK flow and QR-based WhatsApp device-link hijack, and added relevant references to the ESET research and IoC repository. No tests were run (docs-only change).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.