Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsLove? Actually: Fake Dating App Used as Lure in Targeted Spyware Campaign in Pakistan
Love? Actually: Fake Dating App Used as Lure in Targeted Spyware Campaign in Pakistan
Cybersecurity

Love? Actually: Fake Dating App Used as Lure in Targeted Spyware Campaign in Pakistan

•January 28, 2026
0
WeLiveSecurity
WeLiveSecurity•Jan 28, 2026

Companies Mentioned

ESET

ESET

Google

Google

GOOG

WhatsApp

WhatsApp

X (formerly Twitter)

X (formerly Twitter)

Why It Matters

The campaign demonstrates how social‑engineering can blend mobile espionage with multi‑platform attacks, raising the threat level for both consumers and enterprises in the region. It underscores the need for stricter app vetting and user awareness of unconventional lures.

Key Takeaways

  • •GhostChat masquerades as dating app, targeting Pakistani users
  • •Hard‑coded unlock codes create false exclusivity, luring victims
  • •App exfiltrates contacts, documents, images continuously
  • •Campaign links to ClickFix PC malware and WhatsApp hijacking
  • •Google Play Protect blocks known GhostChat variants automatically

Pulse Analysis

Romance‑scam malware has evolved beyond simple phishing, and GhostChat exemplifies this shift. By disguising itself as a chat platform that promises access to locked female profiles, the app taps into emotional incentives that are especially potent in regions where online dating is emerging. The hard‑coded unlock codes reinforce a sense of exclusivity, compelling victims to install the app from unknown sources—a tactic that bypasses traditional app‑store safeguards and highlights the growing sophistication of mobile threat actors targeting specific demographics.

Technically, GhostChat requests extensive permissions at install time and immediately begins background surveillance. It harvests device identifiers, contact lists, and a wide range of file types, uploading them to a C&C server via HTTPS. The malware also installs a content observer to capture newly created images and schedules periodic scans for documents, ensuring continuous data leakage. Hard‑coded credentials and static WhatsApp numbers embedded in the app prevent remote updates, indicating a tightly controlled operation where the attacker distributes both the app and the unlock codes together.

The GhostChat campaign does not operate in isolation; it is linked to a ClickFix attack that tricks users into executing malicious DLLs on Windows machines and a WhatsApp‑pairing scheme that grants attackers full access to victims' messaging accounts. This multi‑vector approach amplifies the espionage impact, compromising both mobile and desktop environments. While Google Play Protect now blocks known variants, the reliance on sideloaded apps and impersonated government sites means organizations must reinforce endpoint security, educate users about unconventional lures, and monitor network traffic for anomalous exfiltration patterns.

Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...