Arid Viper’s Sneaky Spyware: How Trojanized Apps are Targeting Middle East Devices
Arid Viper has launched a mobile espionage campaign using trojanized Android apps to spread the spyware AridSpy. Five campaigns since 2022 have targeted users in Palestine and Egypt. The malware pretends to be secure messaging and job opportunity apps, harvesting data and snapping photos when victims unlock their phones.

Hot Take:
Arid Viper is out here playing the spyware Olympics, and it looks like they’re gunning for gold with their new multi-stage trojan! Who knew cyber espionage could be this ambitious?
Key Points:
- Arid Viper’s mobile espionage campaign uses trojanized Android apps to distribute AridSpy.
- The malware is spread through fake websites mimicking messaging and job opportunity apps.
- Three out of five campaigns are still active, targeting mainly Palestine and Egypt.
- AridSpy can download additional payloads from a command-and-control (C2) server.
- The malware takes sneaky selfies if the victim’s phone battery is above 15% and it’s been more than 40 minutes since the last photo.
Already a member? Log in here