Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Albiriox Android Malware Developed by Russian Cybercriminals

New Albiriox Android Malware Developed by Russian Cybercriminals

Posted on December 1, 2025December 1, 2025 By CWS

A brand new Android malware named Albiriox is being provided on cybercrime boards by Russian-speaking risk actors, in accordance with on-line fraud administration firm Cleafy.

Albiriox is a banking trojan designed for on-device fraud (ODF), enabling attackers to take management of compromised cellular gadgets to hold out fraudulent transactions from the sufferer’s cryptocurrency or banking functions. 

The malware seems to be underneath improvement. It contains distant entry performance that permits real-time management of the compromised Android machine, a function that appears absolutely operational.

Albiriox may also be used for overlay assaults, which contain displaying phishing pages on high of legit functions to trick customers into handing over their banking and cryptocurrency credentials. This performance was nonetheless underneath improvement when Cleafy researchers analyzed the malware.

Albiriox emerged in September, when its builders began recruiting customers for an early model. The trojan has been provided underneath a malware-as-a-service (MaaS) mannequin since October, at a worth of $650 monthly for many who purchased a subscription within the first week, and $720 monthly beginning on October 21. 

One of many first Albiriox campaigns focused customers in Austria, tricking them into putting in the malware by promoting a faux app for the Penny grocery store. 

This faux app served as a dropper designed to trick the sufferer into granting elevated permissions after which delivering the Albiriox malware itself as the ultimate payload. 

An evaluation of the malware revealed that it targets greater than 400 functions worldwide, together with banking, crypto, fintech, pockets, buying and selling, funds, funding, and gaming apps. Commercial. Scroll to proceed studying.

As a way to enhance the malware’s probabilities of evading detection, its builders present a customized builder that integrates with a crypting service named Golden Crypt.

“The inclusion of Golden Crypt throughout the builder pipeline means that the Albiriox operators are intentionally positioning the malware as a stealth-optimized product, aiming to evade static detection mechanisms and enhance the probability of profitable deployment through the early an infection phases, particularly related given the malware’s reliance on the two-stage supply and accessibility-based machine takeover,” Cleafy researchers defined. 

Associated: New Sturnus Banking Trojan Targets WhatsApp, Telegram, Sign Messages

Associated: Chinese language Cyberspies Deploy ‘BadAudio’ Malware through Provide Chain Assaults

Associated: Landfall Android Adware Focused Samsung Telephones through Zero-Day

Security Week News Tags:Albiriox, Android, Cybercriminals, Developed, Malware, Russian

Post navigation

Previous Post: Tomiris Hacker Group Added New Tools and Techniques to Attack Organizations Globally
Next Post: Microsoft Azure API Management Flaw Enables Cross-Tenant Account Creation, Bypassing Admin Restrictions

Related Posts

CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine Security Week News
Ransomware Payments Dropped in Q3 2025: Analysis Ransomware Payments Dropped in Q3 2025: Analysis Security Week News
VS Code Flaws in GitHub Codespaces Risk Supply Chain Attacks VS Code Flaws in GitHub Codespaces Risk Supply Chain Attacks Security Week News
CISA Closes 10 Emergency Directives as Vulnerability Catalog Takes Over CISA Closes 10 Emergency Directives as Vulnerability Catalog Takes Over Security Week News
Critical Wing FTP Server Vulnerability Exploited Critical Wing FTP Server Vulnerability Exploited Security Week News
Will AI-SPM Become the Standard Security Layer for Safe AI Adoption? Will AI-SPM Become the Standard Security Layer for Safe AI Adoption? Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News