Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hugging Face Abused to Deploy Android RAT

Hugging Face Abused to Deploy Android RAT

Posted on January 30, 2026January 30, 2026 By CWS

The Hugging Face infrastructure has been abused for the supply of an Android distant entry trojan (RAT), Bitdefender reviews.

The assault chain begins with an advert or a immediate to obtain and set up a safety utility claiming to supply a number of helpful options.

The appliance, referred to as TrustBastion, acts as a dropper and instantly after launch prompts the person to fetch an replace, displaying legitimate-looking Google Play and Android system replace dialogs.

As soon as the person agrees, the dropper connects to an encrypted endpoint hosted at trustbastion[.]com, which serves an HTML web page that factors to a Hugging Face repository, after which downloads a malicious payload from the web platform’s datasets.

Based on Bitdefender, the Hugging Face repository used within the assault was roughly a month-old when taken offline and had over 6,000 commits. New payloads have been being generated roughly each quarter-hour, the cybersecurity agency says.

“The repository finally went offline, however just for the complete operation to maneuver to a different hyperlink, with the challenge utilizing completely different icons and a few minor changes. The code remained the identical,” Bitdefender explains.Commercial. Scroll to proceed studying.

After set up, the malicious payload requested broad permissions, pretending to be a safety function, and guided the person to allow Accessibility Providers to observe their actions.

It additionally requested permissions to report the display, carry out display casting, and show overlays, enabling it to look at, seize, and modify on-screen content material in actual time.

As soon as permissions are enabled, the malware can management contaminated gadgets and exfiltrate display content material to the command-and-control (C&C) server.

“The malware additionally shows fraudulent authentication interfaces designed to reap delicate credentials. It tries to impersonate widespread monetary and fee companies, together with Alipay and WeChat,” Bitdefender says.

Moreover, the malware may seize lock display data and authentication actions, and was seen sustaining persistent communication with the C&C and downloading webviews to imitate professional performance.

“This infrastructure is used to obtain instructions, transmit stolen information and ship up to date configuration data to contaminated gadgets. The identical infrastructure additionally facilitates payload redirection by serving Hugging Face obtain hyperlinks to the preliminary dropper,” Bitdefender says.

Quickly after the repository internet hosting TrustBastion disappeared on the finish of December, one other repository emerged, internet hosting Premium Membership, a seemingly completely different app that has the identical underlying code. Hugging Face took down the datasets serving the malware, Bitdefender says.

Associated: Kimwolf Android Botnet Grows Via Residential Proxy Networks

Associated: New $150 Cellik RAT Grants Android Management, Trojanizes Google Play Apps

Associated: New Albiriox Android Malware Developed by Russian Cybercriminals

Associated: Landfall Android Spy ware Focused Samsung Telephones by way of Zero-Day

Security Week News Tags:Abused, Android, Deploy, Face, Hugging, RAT

Post navigation

Previous Post: ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
Next Post: GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details

Related Posts

Israeli Cybersecurity Funding Hits .4 Billion Record High Israeli Cybersecurity Funding Hits $4.4 Billion Record High Security Week News
re:Invent 2025: AWS and Security Vendors Unveil New Products and Capabilities  re:Invent 2025: AWS and Security Vendors Unveil New Products and Capabilities  Security Week News
Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks Security Week News
Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities Security Week News
Cyber Insights 2026: Malware and Cyberattacks in the Age of AI Cyber Insights 2026: Malware and Cyberattacks in the Age of AI Security Week News
Recent 7-Zip Vulnerability Exploited in Attacks Recent 7-Zip Vulnerability Exploited in Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News