Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

APT37 hackers abuse Google Find Hub in Android data-wiping attacks

0
High
Published: Tue Nov 11 2025 (11/11/2025, 10:51:50 UTC)
Source: Reddit InfoSec News

Description

APT37, a known advanced persistent threat group, has been observed abusing Google Find Hub functionality to conduct data-wiping attacks on Android devices. This attack leverages the integration between Google Find Hub and Android to remotely trigger destructive actions, leading to potential data loss and device disruption. While no specific affected versions or exploits in the wild have been confirmed, the threat is considered high severity due to the destructive nature and potential for targeted attacks. European organizations using Android devices with Google Find Hub integration are at risk, especially those in sectors targeted by APT37. Mitigation requires strict control over device permissions, monitoring for unusual Find Hub activity, and applying security best practices for Android device management. Countries with high Android adoption and strategic interest to APT37, such as Germany, France, and the UK, are most likely to be affected. The threat is assessed as high severity given the potential impact on data integrity and availability, ease of exploitation via trusted device features, and no need for user interaction. Defenders should prioritize detection of anomalous Find Hub commands and enforce robust endpoint security policies.

AI-Powered Analysis

AILast updated: 11/11/2025, 11:05:28 UTC

Technical Analysis

APT37, also known as Reaper or ScarCruft, is a North Korean state-sponsored advanced persistent threat group known for cyber espionage and destructive attacks. Recent reports indicate that APT37 is abusing the Google Find Hub feature integrated with Android devices to conduct data-wiping attacks. Google Find Hub is designed to help users locate their Android devices remotely and perform actions such as ringing or locking the device. However, APT37 has leveraged this legitimate functionality to trigger destructive commands that wipe data from targeted Android devices. This abuse likely involves unauthorized access or exploitation of the Find Hub service or associated credentials to send wipe commands remotely. Although no specific Android versions or device models have been identified as vulnerable, the attack vector exploits the trust relationship between Google services and Android devices. The data-wiping attacks result in loss of data confidentiality and availability, severely impacting affected users and organizations. The lack of known public exploits suggests this is a targeted campaign rather than widespread exploitation. The minimal discussion and low Reddit score indicate early-stage reporting, but the involvement of a known APT group and the destructive nature of the attack elevate its significance. The attack does not require user interaction once the attacker gains access to the Find Hub control mechanism, increasing the risk of stealthy and effective compromise.

Potential Impact

For European organizations, the impact of this threat can be significant, particularly for those relying heavily on Android devices integrated with Google services. Data-wiping attacks can lead to permanent loss of sensitive corporate data, disruption of business operations, and potential exposure of confidential information prior to wiping. Critical sectors such as government, defense, telecommunications, and finance may face targeted attacks given APT37's historical focus on espionage and sabotage. The destruction of endpoint devices can degrade operational capabilities and require costly recovery efforts. Additionally, the abuse of trusted Google services undermines confidence in device management and remote administration tools. Organizations with Bring Your Own Device (BYOD) policies or insufficient mobile device management (MDM) controls are especially vulnerable. The threat also poses risks to supply chain partners and contractors using Android devices, potentially expanding the attack surface. Overall, the impact extends beyond individual devices to organizational resilience and data governance compliance within Europe.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Enforce strict authentication and authorization controls for Google Find Hub and related device management services, including multi-factor authentication and least privilege principles. 2) Monitor and audit all remote commands issued via Find Hub, establishing alerts for unusual or destructive actions such as data wipes. 3) Employ mobile device management (MDM) solutions that can restrict or log Find Hub usage and provide rapid device recovery options. 4) Regularly update Android devices and Google services to incorporate security patches and improvements. 5) Educate users and administrators about the risks of remote device management abuse and encourage reporting of suspicious activity. 6) Segment networks and limit device access to sensitive resources to reduce impact if a device is compromised. 7) Maintain secure backups of critical data to enable recovery after data-wiping incidents. 8) Collaborate with Google and security vendors to stay informed about emerging threats and recommended defenses related to Find Hub and Android ecosystems.

Need more detailed analysis?Get Pro

Technical Details

Source Type
reddit
Subreddit
InfoSecNews
Reddit Score
1
Discussion Level
minimal
Content Source
reddit_link_post
Domain
bleepingcomputer.com
Newsworthiness Assessment
{"score":55.1,"reasons":["external_link","trusted_domain","newsworthy_keywords:apt","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":["apt"],"foundNonNewsworthy":[]}
Has External Source
true
Trusted Domain
true

Threat ID: 691318691c700d145d067ddb

Added to database: 11/11/2025, 11:05:13 AM

Last enriched: 11/11/2025, 11:05:28 AM

Last updated: 11/12/2025, 5:34:04 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats