Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Perseus Malware Targets Android Devices for Financial Fraud

Perseus Malware Targets Android Devices for Financial Fraud

Posted on March 19, 2026 By CWS

Cybersecurity experts have identified a new threat to Android devices known as the Perseus malware. This malicious software, actively circulating online, is designed to take over devices and commit financial fraud. Perseus builds on the foundations of earlier malware such as Cerberus and Phoenix, offering a more adaptable platform for compromising Android systems through dropper apps distributed via phishing websites.

Remote Monitoring and Regional Focus

Perseus utilizes accessibility-based remote sessions to monitor and interact with infected devices in real-time. This allows for complete control of the device, with a particular emphasis on targeting users in Turkey and Italy. According to ThreatFabric, the malware not only steals credentials but also monitors user notes to extract high-value personal or financial information.

The origin of Cerberus dates back to August 2019 when it was first documented by a Dutch mobile security firm. It was known for exploiting Android’s accessibility service to gain additional permissions and steal sensitive data. Following the release of Cerberus’s source code in 2020, several variants have emerged, including Alien, ERMAC, and Phoenix.

Technical Details and Distribution Tactics

The Perseus malware operates by embedding itself within applications masquerading as legitimate IPTV services. This tactic effectively lowers user suspicion and increases infection rates, as it blends malicious activities with a common distribution model. Reports indicate that Perseus has primarily targeted regions such as Turkey, Italy, Poland, Germany, France, the U.A.E., and Portugal.

Once installed, Perseus behaves like other Android banking malware, conducting overlay attacks and capturing keystrokes to intercept user input. It also displays fake interfaces over financial and cryptocurrency applications to steal user credentials. The malware supports several commands, including scanning notes from various apps, launching remote visual streams, and executing fake user interface interactions.

Advanced Malware Capabilities

Perseus is equipped with the capability to assess the device environment, checking for the presence of debuggers and analysis tools. It verifies SIM card insertion, evaluates the number of installed apps, and monitors battery values to ensure it operates on an actual device. This information is compiled into a suspicion score, sent to the command-and-control panel to guide further actions and potential data theft.

This malware exemplifies the ongoing evolution of Android threats. By combining established techniques from Cerberus and Phoenix with targeted improvements, Perseus highlights a trend towards more efficient and adaptable cyber threats. Its extensive capabilities underscore the need for increased vigilance and robust security measures to protect against evolving digital threats.

The Hacker News Tags:accessibility service, Android security, banking malware, Cerberus, Cybersecurity, financial fraud, mobile security, Perseus malware, Phoenix, ThreatFabric

Post navigation

Previous Post: Raven Secures $20M to Enhance Cloud Security Solutions
Next Post: From Young Hacker to CEO: The Journey of Ben Harris

Related Posts

Ubuntu Security Flaw CVE-2026-3888 Enables Root Access Ubuntu Security Flaw CVE-2026-3888 Enables Root Access The Hacker News
AI’s Impact on Cybersecurity Response Times AI’s Impact on Cybersecurity Response Times The Hacker News
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials The Hacker News
Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord The Hacker News
TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert The Hacker News
Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Two Americans Jailed for ALPHV BlackCat Ransomware Attacks
  • April 2026 Sees 33 Major Cybersecurity M&A Deals
  • Silver Fox Targets India and Russia with ABCDoor Malware
  • DigiCert Enhances Security After Support Portal Hack
  • AI-Driven Cyber Attacks Surge in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Two Americans Jailed for ALPHV BlackCat Ransomware Attacks
  • April 2026 Sees 33 Major Cybersecurity M&A Deals
  • Silver Fox Targets India and Russia with ABCDoor Malware
  • DigiCert Enhances Security After Support Portal Hack
  • AI-Driven Cyber Attacks Surge in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark