
CYFIRMA researchers have uncovered a highly advanced Android remote access trojan (RAT), dubbed GhostSpy, capable of full-spectrum surveillance, data exfiltration, and device control — all without the victim’s knowledge. This malware demonstrates how far mobile spyware has evolved, leveraging system-level APIs, social engineering, and anti-uninstallation mechanisms to maintain persistent access on compromised devices.
“This investigation reveals the high sophistication of the analyzed Android malware, which combines advanced evasion, privilege escalation, and persistent control techniques to compromise mobile devices,” the report states.
According to CYFIRMA, the GhostSpy campaign begins with a deceptive dropper APK, which abuses Android Accessibility Services and UI automation to stealthily sideload a secondary payload (update.apk). By simulating user clicks, it auto-grants all required permissions, bypassing human interaction entirely.
“The malware automatically grants itself all required permissions, simulating user interactions to bypass permission dialogs – eliminating the need for human interaction.”
Once installed, GhostSpy transforms into a full-fledged surveillance tool capable of:
- Keylogging passwords and chats
- Recording screen activity, including protected banking apps
- Capturing camera and microphone feeds
- Monitoring GPS location in real time
- Executing remote commands, including device wipe
To maintain persistence, GhostSpy goes beyond standard evasion. It abuses Device Admin APIs, blocks system uninstallation attempts, and uses full-screen overlays to prevent user action. If a user tries to uninstall the app, a fake warning is displayed, claiming that removing the app will erase all data.

“The overlay blocks interaction with system settings, making uninstallation nearly impossible without advanced knowledge.”
One of GhostSpy’s standout features is its ability to bypass screenshot protections in banking and secure applications using Accessibility-based UI reconstruction. The malware walks through the visual tree of an app’s interface, reconstructing sensitive screen content that would normally be hidden.
It bypasses banking app screen-mirroring protection using a skeleton view reconstruction method, which harvests the full UI layout of protected applications.
This feature allows the attacker to harvest PINs, credit card information, and 2FA tokens from apps like Google Authenticator and Microsoft Authenticator — even if the app blocks screen capture.
GhostSpy connects to a live Command-and-Control (C2) infrastructure, allowing threat actors to issue real-time commands. Active C2 endpoints identified include:
- https[:]//stealth[.]gstpainel[.]fun/
- https[:]//gsttrust[.]org/
- IP: 37[.]60[.]233[.]14[:]3000, [:]4200
Though some servers are currently offline, CYFIRMA observed multiple backup ports and domains, suggesting active development and ongoing usage of this malware family.
“This indicates that GhostSpy is actively maintained and widely used by threat actors.”
OSINT data links GhostSpy to a Brazilian operation. A Telegram channel called @brazillionspy previously promoted the RAT, and a YouTube channel with over 100,000 subscribers showcases the tool. A WhatsApp message featuring the Portuguese phrase “bom dia” (good morning) with the Brazilian +55 country code further strengthens this attribution.
GhostSpy marks a dangerous leap forward in Android malware capabilities, merging social engineering, system API abuse, and persistent access into a powerful tool for cybercriminals. As CYFIRMA warns:
“Conventional uninstallation methods often fail, requiring expert assistance or specialized tools for complete removal, like ADB.”
Organizations and users alike must take action to recognize, prevent, and respond to mobile threats — or risk losing control of the very devices they rely on.