Description

Bitdefender Labs has uncovered a major global malware campaign targeting Android users through Facebook ads. The attack on Windows PCs has evolved into a mobile threat, using fake ads promising free versions of TradingView. Users are tricked into installing a spyware instead, an advanced Brokewell Trojan, tailored to steal cryptocurrency, bypass two-factor authentication, monitor user activity, and hijack accounts. Around 75 malicious ads were already used since late July 2025, affecting tens of thousands of people across Europe and beyond. When a victim taps one of these fake ads, they’re redirected to a cloned website (new-tw-view[.]online) that delivers a malicious Android installer (APK) from tradiwiw[.]online. After installation, it disguises itself with fake updates while demanding dangerous permissions like accessibility access. The malware auto-enables more permissions silently, overlays fake logins on apps like YouTube or Venmo, and tricks users into entering their lock screen PIN. App uses hidden '.dex' files and native libraries to load the actual payload, then deletes the installer to erase its tracks. The trojan steals Bitcoin, Ethereum, and other wallet details, scrapes 2FA codes, and hijacks SMS messages (banking texts). It can record your screen, keystrokes, steal cookies, access your microphone and camera, and even track your live location. Attackers take full control of devices using Tor connection and encrypted WebSockets, for sending messages, making calls, or wipe it remotely. This campaign uses fake ads in various local languages and impersonates brands like Binance, Revolut, Ledger, and also public figures like Donald Trump, making detection harder. To defend, avoid downloading apps from links in ads. Stick to trusted sources like Google Play, check URLs carefully, be wary of apps asking for sensitive permissions. Bitdefender recommends tools like Scamio and Link Checker and installing a reliable mobile security solution to detect threats.