Jun 03, 2025

Rapid Response: Zimperium Detects GhostSpy Android RAT

Nicolás Chiaraviglio

CYFIRMA recently uncovered GhostSpy, a highly stealthy and persistent web-based Android Remote Access Trojan (RAT). Believed to be part of a targeted campaign, GhostSpy allows attackers to gain remote control of infected devices, exfiltrate sensitive information, monitor activity in real time, and resist uninstallation attempts. Its ability to hide within seemingly benign apps and maintain control over a long period makes it particularly dangerous for both individuals and organizations.

GhostSpy stands out due to its advanced persistence mechanisms, including running background services, hiding from app lists, and evading user detection through minimal permissions abuse. Once installed, it can access files, capture device data, monitor communications, and maintain an open communication channel with a command-and-control server—all without raising alarms to the user or standard security solutions.

Zimperium’s Mobile Threat Defense (MTD) and Mobile Runtime Protection (zDefend) detects all the reported GhostSpy IOCs using our on-device dynamic detection engine. Moreover, Zimperium’s MTD detected one of the IOCs on a zDefend protected device, months before the release of the original blog (specifically in November of 2024). The device was an Honor Magic V3 in Singapore running Android 14.

While traditional solutions often rely on static signatures and known indicators, Zimperium's approach enables proactive detection of previously unseen malware based on how it behaves, not just how it looks.

As threats like GhostSpy continue to grow in sophistication—blending stealth, persistence, and targeted capabilities—Zimperium remains committed to protecting mobile users through continuous innovation and real-time detection capabilities.

For a full breakdown of GhostSpy’s capabilities, read CYFIRMA’s report here.