Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs

New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs

Posted on October 28, 2025October 28, 2025 By CWS

A classy Android banking trojan dubbed GhostGrab has emerged within the risk panorama, focusing on monetary establishments throughout a number of areas with superior credential theft capabilities.

The malware operates silently on contaminated gadgets, harvesting delicate banking credentials whereas intercepting one-time passwords by SMS messages.

Safety groups have noticed energetic campaigns distributing GhostGrab by compromised software shops and malicious ads, elevating considerations concerning the evolving sophistication of cellular banking threats.

GhostGrab employs a multi-layered an infection technique that begins with social engineering ways, usually masquerading as respectable productiveness purposes or system utilities.

As soon as put in, the malware requests in depth permissions underneath the guise of normal software performance, together with accessibility providers, SMS entry, and overlay permissions.

Permissions requested (Supply – Cyfirma)

These privileges allow the trojan to observe consumer actions, seize display screen content material, and intercept authentication messages with out triggering instant suspicion from victims.

Cyfirma researchers recognized the malware throughout routine risk intelligence operations, noting its refined strategy to evading detection mechanisms deployed by main banking establishments.

The trojan demonstrates superior anti-analysis capabilities, together with emulator detection and debugger checks that terminate execution when analysis environments are detected.

Evaluation reveals that GhostGrab maintains command-and-control communication by encrypted channels, receiving up to date configuration information that specify focused banking purposes and exfiltration protocols.

The malware’s influence extends past particular person account compromise, as risk actors leverage stolen credentials for unauthorized fund transfers and fraudulent transactions.

Monetary establishments have reported elevated incidents of account takeovers correlating with GhostGrab infections, prompting enhanced monitoring protocols and buyer safety advisories.

Technical Structure and Information Exfiltration Strategies

GhostGrab implements a complicated overlay assault mechanism that shows convincing phishing screens atop respectable banking purposes.

When victims launch focused monetary apps, the malware dynamically generates pixel-perfect replicas of login interfaces, capturing credentials as customers enter them.

The trojan displays incoming SMS messages by registered broadcast receivers, filtering for authentication codes matching widespread OTP patterns.

Extracted credentials and OTP codes are instantly encrypted utilizing AES-256 encryption earlier than transmission to distant servers, minimizing detection by community monitoring instruments.

The malware maintains persistence by system boot receivers and foreground providers that restart core parts following machine reboots or software terminations.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Android, Banking, Details, GhostGrab, Intercept, Login, Malware, OTPs, Silently, SMS, Steals

Post navigation

Previous Post: Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as Buildings are Blown Up
Next Post: New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves

Related Posts

LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization Cyber Security News
Critical Imunify360 AV Vulnerability Exposes 56 Million Linux-hosted Websites to RCE Attacks Critical Imunify360 AV Vulnerability Exposes 56 Million Linux-hosted Websites to RCE Attacks Cyber Security News
Remcos RAT Masquerade as VeraCrypt Installers Steals Users Login Credentials Remcos RAT Masquerade as VeraCrypt Installers Steals Users Login Credentials Cyber Security News
New Research Uncovers Connection Between VPN Apps and Multiple Security Vulnerabilities New Research Uncovers Connection Between VPN Apps and Multiple Security Vulnerabilities Cyber Security News
Critical ASUSTOR Vulnerability Let Attackers Execute Malicious Code with Elevated Privileges Critical ASUSTOR Vulnerability Let Attackers Execute Malicious Code with Elevated Privileges Cyber Security News
Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News