The Android ecosystem is facing a particularly aggressive malware campaign: the Chinese Trojan PlayPraetor has managed to infiltrate thousands of phones and is spreading rapidly through ads on social networks and sites that mimic the appearance of Google Play. Independent researchers have documented a coordinated and professionalized operation that prioritizes financial fraud from the device itself.
The data collected points to more than 11.000 cell phones compromised already at a rate of spread exceeding 2.000 new infections per week. The campaign is particularly targeted at users of Spain, Portugal and France, although outbreaks are also observed in Morocco, Peru and Hong Kong, within a model of malware-as-a-service operated by Chinese-speaking actors.
What is PlayPraetor and how does it work?

PlayPraetor is a RAT (Remote Access Trojan) for Android that leverages accessibility services to take control of the phone as if it were the user himself. This way, operators can Open applications, read messages, authorize operations, and change settings without the victim noticing.
The Trojan deploys overlays that mimic the interface of nearly 200 banking apps and crypto wallets. When credentials or codes are entered, the malware captures them in real time and executes them. On-Device Fraud (ODF) directly from the compromised mobile phone.
In addition to stealing data, operators have the ability to record the screen live, monitor the clipboard, intercept keystrokes, and maintain extended control sessions, facilitating unauthorized transactions and covert movement of funds.
Architecture and technical capabilities
Malware communication is articulated at several levels to ensure persistence and resilience. First establish contact by HTTP / HTTPS with command and control domains, performing iterative queries to packet identification and search routes before activating real-time channels.
Once the connection is verified, it maintains a Persistent WebSocket over the port 8282 for bidirectional execution of orders, and uses a RTMP streaming in the port 1935 to display the device screen while remote actions are performed.
The control panel accepts commands for update configuration, record campaigns, manage overlaps, define target applications, maintain connection heartbeats, and dispatch specialized sub-orders. Exfiltration is performed through dedicated endpoints that send device fingerprint, contacts, SMS and card keys or PINs to specific C2 server API routes.
Variants and criminal ecosystem
PlayPraetor is not a single piece, but a family with five main variants designed for different tasks within the operation:
- PWA: Installs fake progressive web apps that simulate legitimate utilities to lure the victim.
- Phish: uses WebView components to impersonation forms and data theft.
- Phantom: exploits accessibility to automated fraud and persistence with the C2.
- Veil: relies on invitation codes and fake sales campaigns to distribute malicious APKs.
- RAT: integrates familiar remote control tools for espionage and total management of the terminal.
The operation works as affiliate service (MaaS) with a Chinese-language management panel and multi-tenant architecture. In one of the analyzed clusters, two operators managed to group together nearly 60% of the devices under your control (around 4.500), with campaigns showing a notable interest in Lusophone users in addition to Spanish and French speakers.
Distribution and scope
The success of the campaign is based on social engineering. Attackers buy ads on Facebook and Instagram, send SMS with links and lead victims to places that imitate Google Play to download fraudulent APKs outside the official store. If you want to learn more about how to protect yourself, you can also check out Cybersecurity tips for vulnerable households.
After installation, the malware requests accessibility and, according to the observed figures, close to 72% of those affected activate that permission, at which point the device is essentially under operator control.
The infection map shows that Europe concentrates the impact with around 58% of cases, especially in Portugal, Spain and France. Significant outbreaks also remain in Morocco, Peru and Hong Kong, with localized campaigns and content in multiple languages to maximize conversion.
Recommended protective measures
Avoid installing applications outside of Google Play or official sourcesBe wary of links in SMS, social media, or emails that promise discounts, sweepstakes, or "premium" apps.
Review and limit the accessibility permissions and other sensitive permissions from your apps; if you notice strange behavior, uninstall and scan with reputable solutions. To understand how remote control works in these attacks, see our analysis in post-quantum cybersecurity.
Keep Android and your apps updated to close vulnerabilities, and activate the two step verification in banking, crypto and critical services.
At any sign (suspicious overlays, apps that request accessibility without reason, abnormal consumption), cut data, change passwords from a clean computer and Contact your bank to block operations.
PlayPraetor illustrates how a Mobile Trojan operated from Chinese infrastructure, with modules for fraud and remote control, can scale in a matter of weeks by combining social engineering, accessibility permissions, and a robust C2 architecture, affecting thousands of Android users in different countries.