{"id":96248,"date":"2019-08-07T09:10:58","date_gmt":"2019-08-07T16:10:58","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=96248"},"modified":"2025-06-02T20:53:39","modified_gmt":"2025-06-03T03:53:39","slug":"moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/","title":{"rendered":"MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play"},"content":{"rendered":"<p>The McAfee mobile research team has found a new type of Android malware for the <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/android-banking-trojan-moqhao-spreading-via-sms-phishing-south-korea\/\" target=\"_blank\" rel=\"noopener noreferrer\">MoqHao phishing campaign<\/a> (a.k.a. <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing\/\" target=\"_blank\" rel=\"noopener noreferrer\">XLoader<\/a> and <a href=\"https:\/\/securelist.com\/roaming-mantis-part-iv\/90332\/\" target=\"_blank\" rel=\"noopener noreferrer\">Roaming Mantis<\/a>) targeting Korean and Japanese users. A series of attack campaigns are still active, mainly targeting Japanese users. The new spyware has very different payloads from the existing MoqHao samples. However, we found evidence of a connection between the distribution method used for the existing campaign and this new spyware. All the spyware we found this time pretends to be security applications targeting users in Japan and Korea. We discovered a phishing page related to <a href=\"https:\/\/www.networkworld.com\/article\/3389747\/cisco-talos-details-exceptionally-dangerous-dns-hijacking-attack.html\" target=\"_blank\" rel=\"noopener noreferrer\">DNS Hijacking attack<\/a>, designed to trick the user into installing the new spyware, distributed on the Google Play store.<\/p>\n<h2>Fake Japanese Security Apps Distributed on Google Play<\/h2>\n<p>We found two fake Japanese security applications. The package names are com.jshop.test and com.jptest.tools2019. These packages were distributed on the Google Play store. The number of downloads of these applications was very low. Fortunately, the spyware apps had been immediately removed from the Google Play store, so we acquired the malicious bullets thanks to the Google Android Security team.<\/p>\n<p>This Japanese spyware has four command and control functions. Below is the server command list used with this spyware. The spyware attempts to collect device information like IMEI and phone number and steal SMS\/MMS messages on the device. These malicious commands are sent from a push service of Tencent Push Notification Service.<\/p>\n<p><em>Table 1. The command lists<\/em><\/p>\n<p>We believe that the cybercriminal included minimal spyware features to bypass Google\u2019s security checks to distribute the spyware on the Google Play store, perhaps with the intention of adding additional functionality in future updates, once approved.<\/p>\n<h2>Fake Korean Police Apps<\/h2>\n<p>Following further investigation, we found other very similar samples to the above fake Japanese security applications, this time targeting Korean users. A fake Korean police application disguised itself as an anti-spyware application. It was distributed with a filename of cyber.apk on a host server in Taiwan (that host has previously been associated with malicious phishing domains impersonating famous Japanese companies). It used the official icon of the Korean police application and a package name containing \u2018kpo\u2019, along with references to com.kpo.scan and com.kpo.help, all of which relate to the Korean police.<\/p>\n<p>The Trojanized package was obfuscated by the Tencent packer to hide its malicious spyware payload. Unlike the existing samples used in the MoqHao campaign, where the C&amp;C server address was simply embedded in the spyware application; MoqHao samples hide and access the control server address via Twitter accounts.<\/p>\n<p>The malware has very similar spyware functionality to the fake Japanese security application. However, this one features many additional commands compared to the Japanese one. Interestingly, the Tencent Push Service is used to issue commands to the infected user.<\/p>\n<p>The code and table below show characteristics of the server command and content list.<\/p>\n<p><em>Table 2. The command lists<\/em><\/p>\n<p>There are several interesting functions implemented in this spyware. To execute an automated phone call function on a default calling application, KAutoService class has an implementation to check content in the active window and automatically click the start call button.<\/p>\n<p>Another interesting function attempts to disable anti-spam call applications (e.g. <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.ktcs.whowho&amp;hl=en\">whowho &#8211; Caller ID &amp; Block<\/a>), which warns users if it is suspicious in the case of incoming calls from an unknown number. The disable function of these call security applications in the spyware allows cyber criminals to make a call without arousing suspicion as no alert is issued from the anti-spam call apps, thus increasing the success of social engineering.<\/p>\n<h2>Connection with Active MoqHao Campaigns<\/h2>\n<p>The malware characteristics and structures are very different from the existing MoqHao samples. We give special thanks to <a href=\"https:\/\/twitter.com\/ZeroCERT\" target=\"_blank\" rel=\"noopener noreferrer\">@ZeroCERT<\/a> and @ninoseki, without who we could not have identified the connection to the active MoqHao attack and DNS hijacking campaigns. The server script on the phishing website hosting the fake Chrome application leads victims to a fake Japanese security application on the Google Play store (https:\/\/play.google.com\/store\/apps\/details?id=com.jptest.tools2019) under specific browser conditions.<\/p>\n<p>There is a strong correlation between both the fake Japanese and Korean applications we found this time. This malware has common spy commands and shares the same crash report key on a cloud service. Therefore, we concluded that both pieces of spyware are connected to the ongoing MoqHao campaigns.<\/p>\n<h2>Conclusion<\/h2>\n<p>We believe that the spyware aims to masquerade as a security application and perform spy activities, such as tracking device location and eavesdropping on call conversations. It is distributed via an official application store that many users trust. The attack campaign is still ongoing, and it now features a new Android spyware that has been created by the cybercriminals. McAfee is working with Japanese law enforcement agencies to help with the takedown of the attack campaign. To protect your privacy and keep your data from cyber-attacks, please do not install apps from outside of official application stores. Keep firmware up to date on your device and make sure to protect it from malicious apps by installing security software on it.<\/p>\n<p>McAfee Mobile Security detects this threat as Android\/SpyAgent and alerts mobile users if it is present, while protecting them from any data loss. For more information about McAfee Mobile Security, visit <a href=\"https:\/\/www.mcafeemobilesecurity.com\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.mcafeemobilesecurity.com<\/a><\/p>\n<h2>Appendix &#8211; IOCs<\/h2>\n<p><em>Table 4. Fake Japanese security application IOCs<\/em><\/p>\n<p><em>Table 5. Fake Korean police application IOCs<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader&#8230;<\/p>\n","protected":false},"author":1083,"featured_media":95077,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[5847,2842],"class_list":["post-96248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader and Roaming Mantis) targeting\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader and Roaming Mantis) targeting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/pushr0\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-07T16:10:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T03:53:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1575\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chanung Pak, Yukihiro Okutomi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@imkkoha\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chanung Pak, Yukihiro Okutomi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/\"},\"author\":{\"name\":\"Chanung Pak\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8a0bdfc7559f657e5edc2a931b31d663\"},\"headline\":\"MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play\",\"datePublished\":\"2019-08-07T16:10:58+00:00\",\"dateModified\":\"2025-06-03T03:53:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/\"},\"wordCount\":919,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/\",\"name\":\"MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\",\"datePublished\":\"2019-08-07T16:10:58+00:00\",\"dateModified\":\"2025-06-03T03:53:39+00:00\",\"description\":\"The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader and Roaming Mantis) targeting\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg\",\"width\":1575,\"height\":1125},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8a0bdfc7559f657e5edc2a931b31d663\",\"name\":\"Chanung Pak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b39f964a2f305bf3942c59193b875894\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/chanung_pak_2-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/chanung_pak_2-96x96.png\",\"caption\":\"Chanung Pak\"},\"description\":\"Chanung is a Security Researcher on McAfee's Mobile Research Team. Previously focused on finding new vulnerabilities in both software and hardware. He specializes in mobile threats and malware, and focuses on reverse-engineering of embedded devices and IOT.\",\"sameAs\":[\"https:\/\/www.facebook.com\/pushr0\",\"https:\/\/x.com\/imkkoha\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/chanung-pak\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play | McAfee Blog","description":"The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader and Roaming Mantis) targeting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play | McAfee Blog","og_description":"The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader and Roaming Mantis) targeting","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/pushr0","article_published_time":"2019-08-07T16:10:58+00:00","article_modified_time":"2025-06-03T03:53:39+00:00","og_image":[{"width":1575,"height":1125,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","type":"image\/jpeg"}],"author":"Chanung Pak, Yukihiro Okutomi","twitter_card":"summary_large_image","twitter_creator":"@imkkoha","twitter_site":"@McAfee","twitter_misc":{"Written by":"Chanung Pak, Yukihiro Okutomi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/"},"author":{"name":"Chanung Pak","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8a0bdfc7559f657e5edc2a931b31d663"},"headline":"MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play","datePublished":"2019-08-07T16:10:58+00:00","dateModified":"2025-06-03T03:53:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/"},"wordCount":919,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/","name":"MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","datePublished":"2019-08-07T16:10:58+00:00","dateModified":"2025-06-03T03:53:39+00:00","description":"The McAfee mobile research team has found a new type of Android malware for the MoqHao phishing campaign (a.k.a. XLoader and Roaming Mantis) targeting","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Global-Cyber-security-concept-copy.jpg","width":1575,"height":1125},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-related-android-spyware-targeting-japan-and-korea-found-on-google-play\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"MoqHao Related Android Spyware Targeting Japan and Korea Found on Google Play"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8a0bdfc7559f657e5edc2a931b31d663","name":"Chanung Pak","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b39f964a2f305bf3942c59193b875894","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/chanung_pak_2-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/chanung_pak_2-96x96.png","caption":"Chanung Pak"},"description":"Chanung is a Security Researcher on McAfee's Mobile Research Team. Previously focused on finding new vulnerabilities in both software and hardware. He specializes in mobile threats and malware, and focuses on reverse-engineering of embedded devices and IOT.","sameAs":["https:\/\/www.facebook.com\/pushr0","https:\/\/x.com\/imkkoha"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/chanung-pak\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1083"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=96248"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96248\/revisions"}],"predecessor-version":[{"id":214985,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96248\/revisions\/214985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/95077"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=96248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=96248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=96248"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=96248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}