Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs

New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs

Posted on November 7, 2025November 7, 2025 By CWS

Russian-based risk actors are distributing a complicated Android Distant Entry Trojan via underground channels, providing it as a subscription service to different criminals.

The malware, recognized as Fantasy Hub, permits attackers to conduct widespread surveillance operations on compromised cellular units, stealing delicate communications and private info from unsuspecting customers.

The spyware and adware’s capabilities lengthen far past primary information theft, offering attackers with instruments to intercept two-factor authentication messages, entry banking credentials, and carry out real-time gadget monitoring.

Fantasy Hub operates beneath a Malware-as-a-Service mannequin, considerably reducing the technical boundaries for attackers with minimal experience.

Risk actors promote the malware on Russian-language channels and embrace hyperlinks to a Telegram bot that manages subscriptions and offers entry to the malware builder.

Commercial from the vendor (Supply – Zimperium)

The attackers check with compromised units and their house owners as “mammoths,” drawing customers into a complicated social engineering ecosystem that mixes phishing methods with technical sophistication.

Attackers obtain full documentation, together with video tutorials, on deploying the malware and bypassing safety restrictions.

Zimperium safety researchers recognized Fantasy Hub’s refined infrastructure, which features a Russian-language command and management panel and complete operational guides for attackers.

The malware’s focusing on technique particularly focuses on monetary establishments reminiscent of Alfa, PSB, Tbank, and Sber, the place operators deploy pretend login home windows to seize banking credentials.

This monetary focus underscores the intense risk posed to enterprise environments the place staff use cellular banking or delicate purposes on private units.

Technical Evasion Mechanisms

Fantasy Hub employs superior detection evasion techniques to stay hidden from safety evaluation.

The malware makes use of a local dropper embedded inside a metamask_loader library that decrypts an encrypted asset known as metadata.dat throughout runtime.

Sellers guiding the attackers on creating telegram channels to obtain notifications (Supply – Zimperium)

The decryption course of depends on a customized XOR encryption routine utilizing a set 36-byte key sample, adopted by gzip decompression via zlib.

This two-stage encryption method considerably reduces static indicators that conventional antivirus options would possibly detect.

The malware additional leverages the SMS handler position abuse method, much like ClayRat spyware and adware, consolidating a number of highly effective permissions together with contacts, digicam, and file entry right into a single authorization step.

The dropper masquerades as a Google Play Replace to decrease person suspicion, whereas current samples display root detection capabilities to evade dynamic evaluation environments.

Moreover, Fantasy Hub integrates WebRTC for establishing stay audio and video streaming channels, enabling real-time surveillance capabilities that considerably broaden the attacker’s reconnaissance potential past conventional information exfiltration strategies.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Call, Contacts, Fantasy, Hub, Intercepts, Logs, Malware, Messages, SMS

Post navigation

Previous Post: Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks
Next Post: New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model

Related Posts

Microsoft Dismantles 300+ Websites Used to Distribute RaccoonO365 Phishing Service Microsoft Dismantles 300+ Websites Used to Distribute RaccoonO365 Phishing Service Cyber Security News
CISA Warns of OpenPLC ScadaBR cross-site scripting vulnerability Exploited in Attacks CISA Warns of OpenPLC ScadaBR cross-site scripting vulnerability Exploited in Attacks Cyber Security News
AuraStealer Malware Emerges with Expanding C2 Network AuraStealer Malware Emerges with Expanding C2 Network Cyber Security News
New Report Warns of Threat Actors Actively Adopting AI Platforms to Attack Manufacturing Companies New Report Warns of Threat Actors Actively Adopting AI Platforms to Attack Manufacturing Companies Cyber Security News
Europol Disrupted “NoName057(16)” Hacking Group’s Infrastructure of 100+ Servers Worldwide Europol Disrupted “NoName057(16)” Hacking Group’s Infrastructure of 100+ Servers Worldwide Cyber Security News
Npm Ecosystem Hit by New Worm Targeting Developer Secrets Npm Ecosystem Hit by New Worm Targeting Developer Secrets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark