Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FvncBot Exploits Android Accessibility: A New Threat

FvncBot Exploits Android Accessibility: A New Threat

Posted on February 6, 2026 By CWS

A newly discovered malware, FvncBot, is posing a significant threat to Android users, particularly targeting those involved with mobile banking in Poland. Identified on November 25, 2025, this malicious software impersonates a legitimate security application from mBank, one of Poland’s leading financial institutions.

Deceptive Tactics and Installation

The FvncBot malware deceives users by presenting itself as a credible banking tool, tricking them into installing the application. Once installed, it silently operates in the background, aiming to compromise financial accounts through advanced surveillance tactics.

The infection process involves a deceptive prompt urging users to install an additional “Play” component, claimed to be essential for maintaining system stability. This strategy is crucial to bypass Android’s security measures, allowing the malware to gain a persistent presence on the device.

Innovative and Invasive Capabilities

Intel 471’s research revealed that FvncBot is an entirely original creation, not derived from any known banking trojan codes. This suggests a new group of developers behind its development. The malware employs invasive methods to steal funds by logging keystrokes and capturing screen data.

One of its alarming features is the use of hidden virtual network computing, enabling attackers to remotely control the infected device. This capability allows cybercriminals to conduct fraudulent transactions without the victim’s knowledge.

Exploiting Accessibility Services

FvncBot’s most concerning tactic is its exploitation of Android’s accessibility services to maintain control over the device. After installation, it persistently requests elevated privileges, guiding users to grant these permissions in system settings. Once granted, the malware can read on-screen text and monitor user interactions.

With these permissions, FvncBot can extract data from any open application, including secure banking interfaces, and transmit this information to a remote server. The malware also uses WebSockets to establish a rapid connection, allowing operators to issue commands and manipulate the device in real-time.

To mitigate such threats, users are advised to download banking applications solely from official sources and avoid unverified websites. Staying informed about such cyber threats is crucial for maintaining device security.

Cyber Security News Tags:accessibility services, Android security, banking trojan, cyber threat, Cybersecurity, FvncBot, Intel471, Malware, mBank, mobile banking

Post navigation

Previous Post: Transparent Tribe Targets India’s Tech Startups
Next Post: Claude Opus 4.6 Unveils 500+ Critical Vulnerabilities

Related Posts

Google Chrome 0-Day Vulnerability Actively Exploited in the Wild Google Chrome 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
Critical React Router Vulnerability Let Attackers Access or Modify Server Files Critical React Router Vulnerability Let Attackers Access or Modify Server Files Cyber Security News
Top 10 Best Cyber Threat Intelligence Companies in 2025 Top 10 Best Cyber Threat Intelligence Companies in 2025 Cyber Security News
Authorities Seize BreachForums New Clearnet Cybercrime Marketplace Domain Authorities Seize BreachForums New Clearnet Cybercrime Marketplace Domain Cyber Security News
New Tool Analyzes LinkedIn Contacts with Epstein Files New Tool Analyzes LinkedIn Contacts with Epstein Files Cyber Security News
Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News