A newly identified Android malware campaign is disguising itself as authentic Indian banking applications, aiming to steal credentials, perform surveillance, and conduct unauthorized financial activities. This malware is highly sophisticated, using a two-part structure an initial dropper and a main payload to silently install itself and maintain persistence on infected devices. By imitating legitimate banking interfaces, it deceives users into submitting sensitive data while bypassing security measures. The malware utilizes Firebase as its control hub, deploying deceptive phishing screens to capture sensitive user credentials. It exploits Android permissions such as ACCESS_NETWORK_STATE to discreetly monitor network activity and QUERY_ALL_PACKAGES to identify installed banking apps, enabling targeted attacks. The dropper silently transfers its core payload from the app's internal storage to external memory and initiates its installation, effectively bypassing typical security checks mirroring tactics used in sophisticated financial malware. The active payload seeks permissions like READ_SMS, SEND_SMS, and RECEIVE_SMS with the intent of exfiltrating one-time passwords (OTPs) and two-factor authentication codes. It further misuses access to phone state and SIM data via READ_PHONE_STATE and READ_PHONE_NUMBERS, facilitating device profiling and potential call redirection through USSD commands. Operating in stealth mode, the malware conceals its presence by removing its launcher icon and utilizes modular classes to harvest account credentials, card details, and ensure long-term persistence on the device. The malware communicates through Firebase Realtime Database and FCM for real-time command execution and data exfiltration. It was still active and receiving commands during investigation, highlighting its persistent threat. First observed in April 2025, it is distributed through multiple vectors, including smishing, phishing, QR/NFC exploits, and fake utility apps. This campaign underscores the urgent need for layered security, awareness around app permissions, and better threat detection across financial systems.
In mid 2024, security teams detected a series of targeted attacks on government, defense, and technology organizations globally attributed to an adversary group referred to as RedN...
A loosely affiliated cybercriminal collective is actively targeting Fortune 100 companies and government agencies using advanced social engineering tactics. Groups like LAPSUS$, Sc...
Cisco has released a critical alert about a newly found input validation vulnerability impacting various products such as ASA, FTD, IOS, IOS XE, and IOS XR software. Identified as ...