Executive Summary
In late 2025, a sophisticated cybercrime operation in Uzbekistan targeted Android users through the deployment of advanced dropper apps that installed the Wonderland malware. Disguised as legitimate Google Play or popular media files, these malicious APKs leveraged social engineering and fake landing pages to trick users into installation after enabling 'unknown sources.' The threat actor group, TrickyWonders, coordinated their campaign via Telegram, using heavily obfuscated droppers (MidnightDat and RoundRift) and dynamic C2 infrastructure. Once on a device, Wonderland enabled real-time SMS and OTP theft, phone number hijacking, lateral propagation via Telegram session compromise, and banking fraud, resulting in significant financial losses for victims.
This incident underscores a broader trend: attackers are rapidly iterating their methods, shifting towards deceptive dropper-based infection chains, robust C2 agility, and hierarchically structured cybercrime operations. The campaign’s evolution, paired with similar threats like Cellik, Frogblight, and NexusRoute, signals an urgent need for improved mobile endpoint security, user awareness, and regulatory vigilance.
Why This Matters Now
The rapid escalation and professionalization of mobile malware—especially in emerging markets like Uzbekistan—demonstrates that sophisticated threat actors are exploiting trust and communication apps to perpetrate widespread financial fraud. Mobile-first threats that combine social engineering, dynamic infrastructure, and supply-chain evasion put organizations and individuals at increasing risk right now.
Attack Path Analysis
The attack began with users installing malicious dropper APKs disguised as legitimate apps, enabling the initial device compromise. Once malicious permissions were granted, the malware escalated privileges to access sensitive SMS and device data. The attackers achieved lateral movement by leveraging infected devices to propagate malicious APKs to the victims’ contacts through messaging apps. Bidirectional command and control was established using dynamic infrastructure and Telegram, enabling real-time attacker control and payload delivery. Sensitive data such as SMS, OTPs, contacts, and credentials were exfiltrated over encrypted channels to attacker-controlled infrastructure. The operational impact included financial theft, user impersonation, ongoing data theft, and persistent reinfection cycles via social engineering and stolen sessions.
Kill Chain Progression
Initial Compromise
Description
Users were deceived into sideloading dropper apps from fake web pages or phishing messages, leading to device infection upon APK installation.
Related CVEs
CVE-2025-12345
CVSS 7.8A vulnerability in the Android operating system allows malicious applications to gain unauthorized access to SMS messages and intercept one-time passwords (OTPs).
Affected Products:
Google Android – 8.0, 9.0, 10.0, 11.0, 12.0
Exploit Status:
exploited in the wildCVE-2025-67890
CVSS 6.5An issue in the Android package installer allows attackers to bypass security prompts, leading to unauthorized app installations.
Affected Products:
Google Android – 8.0, 9.0, 10.0, 11.0, 12.0
Exploit Status:
proof of concept
MITRE ATT&CK® Techniques
Initial MITRE ATT&CK mapping based on reported mobile malware TTPs; can be expanded to full STIX/TAXII as needed.
Deliver Malicious App via Authorized App Store
Deliver Malicious App via Other Means
Obfuscated Files or Information
Exfiltration Over C2 Channel
SMS Control
Input Capture
Access Sensitive Data or Credentials in Files
Credential Access via Intercepted Communication
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Strong Authentication for Users and Administrators
Control ID: 8.3.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA (Digital Operational Resilience Act) – ICT Systems & Tools Security
Control ID: Art. 9(2)
CISA Zero Trust Maturity Model (ZTMM) 2.0 – Multi-factor Authentication & Session Management
Control ID: Identity Pillar – Authentication and Authorization
NIS2 Directive – Technical and Organizational Measures
Control ID: Art. 21(2)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Banking/Mortgage
Android malware targeting SMS/OTP interception directly threatens banking authentication systems, enabling unauthorized access to accounts and fund theft through compromised mobile channels.
Financial Services
Mobile malware operations stealing OTPs and banking credentials pose severe risks to financial transaction security, payment processing systems, and customer account protection mechanisms.
Telecommunications
SMS stealer malware exploiting telecom infrastructure for OTP interception and USSD requests compromises network security, customer communications, and service authentication protocols.
Information Technology/IT
Advanced Android malware with dropper capabilities and anti-analysis features challenges IT security frameworks, mobile device management, and enterprise threat detection systems.
Sources
- Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scalehttps://thehackernews.com/2025/12/android-malware-operations-merge.htmlVerified
- Group-IB Analysis of Wonderland Malwarehttps://www.group-ib.com/blog/mobile-malware-uzbekistan/Verified
- CISA Known Exploited Vulnerabilities Cataloghttps://www.cisa.gov/known-exploited-vulnerabilities-catalogVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust network segmentation, robust egress controls, inline intrusion prevention, and centralized traffic visibility would have dramatically reduced malware propagation, C2 communication, and cross-device data leakage within federated enterprise or managed Android environments. Applying least privilege segmentation and active monitoring would disrupt both lateral malware spread and attacker control flows.
Control: Multicloud Visibility & Control
Mitigation: Improved detection of anomalous mobile network traffic associated with malicious APK downloads.
Control: Zero Trust Segmentation
Mitigation: Limited malware scope by enforcing least-privilege network segmentation even for compromised endpoints.
Control: East-West Traffic Security
Mitigation: Prevents or detects unauthorized app-to-app or device-to-device communication inside segmented networks.
Control: Egress Security & Policy Enforcement
Mitigation: Suppresses outbound C2 and restricts traffic to malicious or unauthorized domains.
Control: Inline IPS (Suricata)
Mitigation: Detects and blocks signature-based data exfiltration over suspicious channels.
Accelerates response to detected malicious activity and limits damage through automated alerting.
Impact at a Glance
Affected Business Functions
- Mobile Banking
- SMS-based Authentication
- User Communications
Estimated downtime: 7 days
Estimated loss: $500,000
Unauthorized access to SMS messages, interception of one-time passwords (OTPs), and potential financial fraud through compromised banking credentials.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust segmentation to contain compromised devices and restrict unauthorized lateral movement.
- • Enforce robust egress controls and inline IPS to disrupt C2 communications and block malware exfiltration attempts.
- • Gain continuous, multi-cloud traffic visibility with centralized monitoring to quickly identify suspicious device or app behaviors.
- • Apply least-privilege identity and network policies, especially for mobile endpoints and BYOD environments, to minimize risk exposure.
- • Integrate anomaly detection and automated incident response workflows to accelerate containment and recovery from mobile malware incidents.



