Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs

New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs

Posted on November 7, 2025November 7, 2025 By CWS

Russian-based risk actors are distributing a complicated Android Distant Entry Trojan via underground channels, providing it as a subscription service to different criminals.

The malware, recognized as Fantasy Hub, permits attackers to conduct widespread surveillance operations on compromised cellular units, stealing delicate communications and private info from unsuspecting customers.

The spyware and adware’s capabilities lengthen far past primary information theft, offering attackers with instruments to intercept two-factor authentication messages, entry banking credentials, and carry out real-time gadget monitoring.

Fantasy Hub operates beneath a Malware-as-a-Service mannequin, considerably reducing the technical boundaries for attackers with minimal experience.

Risk actors promote the malware on Russian-language channels and embrace hyperlinks to a Telegram bot that manages subscriptions and offers entry to the malware builder.

Commercial from the vendor (Supply – Zimperium)

The attackers check with compromised units and their house owners as “mammoths,” drawing customers into a complicated social engineering ecosystem that mixes phishing methods with technical sophistication.

Attackers obtain full documentation, together with video tutorials, on deploying the malware and bypassing safety restrictions.

Zimperium safety researchers recognized Fantasy Hub’s refined infrastructure, which features a Russian-language command and management panel and complete operational guides for attackers.

The malware’s focusing on technique particularly focuses on monetary establishments reminiscent of Alfa, PSB, Tbank, and Sber, the place operators deploy pretend login home windows to seize banking credentials.

This monetary focus underscores the intense risk posed to enterprise environments the place staff use cellular banking or delicate purposes on private units.

Technical Evasion Mechanisms

Fantasy Hub employs superior detection evasion techniques to stay hidden from safety evaluation.

The malware makes use of a local dropper embedded inside a metamask_loader library that decrypts an encrypted asset known as metadata.dat throughout runtime.

Sellers guiding the attackers on creating telegram channels to obtain notifications (Supply – Zimperium)

The decryption course of depends on a customized XOR encryption routine utilizing a set 36-byte key sample, adopted by gzip decompression via zlib.

This two-stage encryption method considerably reduces static indicators that conventional antivirus options would possibly detect.

The malware additional leverages the SMS handler position abuse method, much like ClayRat spyware and adware, consolidating a number of highly effective permissions together with contacts, digicam, and file entry right into a single authorization step.

The dropper masquerades as a Google Play Replace to decrease person suspicion, whereas current samples display root detection capabilities to evade dynamic evaluation environments.

Moreover, Fantasy Hub integrates WebRTC for establishing stay audio and video streaming channels, enabling real-time surveillance capabilities that considerably broaden the attacker’s reconnaissance potential past conventional information exfiltration strategies.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Call, Contacts, Fantasy, Hub, Intercepts, Logs, Malware, Messages, SMS

Post navigation

Previous Post: Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks
Next Post: New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model

Related Posts

Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered Cyber Security News
GitLab High-Severity Vulnerabilities Let Attackers Crash Instances GitLab High-Severity Vulnerabilities Let Attackers Crash Instances Cyber Security News
How AI Is Redefining Threat Detection In The Cloud Era How AI Is Redefining Threat Detection In The Cloud Era Cyber Security News
Microsoft Patch Tuesday July 2025: 130 Vulnerabilities Fixed Including 41 RCE Microsoft Patch Tuesday July 2025: 130 Vulnerabilities Fixed Including 41 RCE Cyber Security News
How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment  How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment  Cyber Security News
New Spiderman Phishing Kit Lets Attackers Create Malicious Bank Login Pages in Few Clicks New Spiderman Phishing Kit Lets Attackers Create Malicious Bank Login Pages in Few Clicks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News