Author: Aarsh Jawa
In recent months, the mobile cyber threat ecosystem has witnessed a dramatic shift, largely driven by the growing popularity of Malware-as-a-Service (MaaS) platforms.
Once the domain of skilled threat actors, sophisticated Android malware can now be rented by virtually anyone with a few hundred dollars and an internet connection. This democratization of malware development has not only increased the volume of mobile threats, but has also amplified their impact, powering campaigns involving fake apps, surveillance tools, and even extortion at scale.
MaaS, also known as Ransomware-as-a-Service (RaaS), operates in a similar manner to a traditional Software as a Service (SaaS) business model. Malware and Ransomware developers take on the work of developing and maintaining malicious tools and infrastructure, and then package their tools and services into MaaS and RaaS kits that they sell to other hackers, known as affiliates.
According to the IBM Cost of a Data Breach report, the average ransomware breach cost victims USD $4.91 million in 2024.
Platforms like PhantomOS and Nebula exemplify how MaaS has evolved. These services allow attackers to subscribe to malware packages with features such as:
With prices starting as low as $300/month, these toolkits eliminate the need for technical skill, making it easy for inexperienced actors to orchestrate high-impact mobile attacks. MaaS platforms even provide admin panels, dashboards, and support services – essentially offering a full criminal SaaS model for mobile surveillance and fraud.
The downstream effect of MaaS can be seen in the proliferation of fake mobile applications, particularly those impersonating dating apps, file-sharing tools, and cloud storage platforms. These apps:
Many of these fake apps are built using pre-configured MaaS templates, allowing for rapid customization and deployment. Because the core malware functionality is handled by MaaS platforms, attackers can focus on branding, distribution, and targeting—turning what was once a manual, high-effort process into a scalable operation.
A chilling example of this model in action is the SarangTrap campaign, uncovered by Zimperium. This campaign involved:
Once installed, these apps harvested photos, contacts, and chat logs. Victims were then extorted: the attackers threatened to leak their personal data or intimate conversations unless a ransom was paid.
The technical underpinnings of SarangTrap – data theft, remote access, surveillance – strongly resemble features advertised by MaaS platforms. The scale, speed, and regional focus suggest not a one-off operation but a commercial campaign, likely built on rented malware infrastructure.
What ties these cases together is a clear mobile malware supply chain, now powered by MaaS:
MaaS is the factory. Fake apps are the product. Campaigns like SarangTrap are the business model.
The convergence of MaaS with mobile campaigns presents several key challenges:
What used to take time, effort, and technical skill is now available “on demand.” Whether it’s launching fake apps to harvest credentials or running regional extortion operations like SarangTrap, the common denominator is the availability of MaaS platforms that arm cybercriminals with turnkey mobile surveillance and fraud kits.
What we’re witnessing is the industrialization of mobile cybercrime. MaaS platforms like PhantomOS and Nebula have transformed mobile threats from isolated incidents into scalable, repeatable business models. No longer limited to elite hackers, sophisticated attacks can now be executed by virtually anyone with a credit card and a motive. Campaigns like SarangTrap are no longer outliers. Instead, they're early warnings of a world where identity theft, extortion, and digital surveillance are just a few clicks away.
For defenders, this demands a new mindset: not just detecting threats, but understanding and disrupting the supply chains that power them. When malware becomes a service, defense must become a strategy.
See more MaaS examples below. To see how Doppel's proactive strategy stops social engineering before it does damage, book a demo.
This screenshot below captures an underground forum post advertising PhantomOS V1, a highly advanced Android Malware-as-a-Service (MaaS) offering. Marketed toward elite fraud operators, this tool enables remote silent APK injection, OTP interception, phishing overlays via hidden URLs (StealthPanels), and full control of victim accounts and data.
This image below showcases a dark web advertisement promoting a private Android banking botnet known as THANOS Botnet. It’s being marketed as a premium Malware-as-a-Service (MaaS) tool designed for cybercriminals conducting mobile banking fraud, phishing, and data exfiltration. It also lists capabilities that the final compiled malware (bot) has once it’s deployed on a victim’s Android device. These are the core spying and control features attackers can use after infecting the device.