Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Android Spyware Disguised as an Antivirus Attacking Business Executives

New Android Spyware Disguised as an Antivirus Attacking Business Executives

Posted on August 25, 2025August 25, 2025 By CWS

In latest months, safety groups have noticed the emergence of a extremely versatile Android backdoor, Android.Backdoor.916.origin, masquerading as a respectable antivirus utility.

Distributed through personal messaging companies below the guise of “GuardCB,” its icon carefully mimics the logo of the Central Financial institution of the Russian Federation in opposition to a defend background.

Malicious app icons mislead potential victims (Supply – Dr.Net)

Though the interface shows solely Russian language prompts, this malware has been deployed in focused campaigns in opposition to Russian enterprise executives, extracting delicate company communications and private information.

Upon set up, the counterfeit antivirus simulates system scans, randomly “detecting” between one and three fictitious threats, with detection charges rising the longer a tool stays unscanned, although by no means exceeding 30 p.c.

This misleading conduct lulls victims into believing the appliance supplies real safety.

Beneath this veneer, the backdoor silently requests a protracted record of permissions—geolocation, audio recording, SMS and contacts entry, digicam management, background execution, gadget administrator rights, and Accessibility Service privileges.

Pretend AV instrument (Supply – Dr.Net)

Dr.Net researchers famous that when these permissions are granted, the malware initiates a number of persistent companies that self-monitor each minute, reconnecting to its command-and-control (C2) infrastructure every time mandatory.

Via separate C2 ports, operators can harvest name logs, SMS visitors, contact lists, and geolocation information; stream microphone audio, digicam video, or gadget display screen captures; siphon saved photos; and even execute arbitrary shell instructions.

The trojan’s potential to toggle self-defense routines through the Accessibility Service permits it to thwart removing makes an attempt by overlaying pretend system interfaces or disabling uninstall choices.

The sophistication of Android.Backdoor.916.origin is underscored by its dynamic configuration, which might incorporate as much as fifteen completely different internet hosting suppliers, though solely a subset is lively in present campaigns.

Area registrar notifications have prompted some takedowns, however the mule-like resilience of the C2 community continues to frustrate defenders.

Dr.Net antivirus for Android efficiently detects and removes recognized variants, but the tailor-made nature of those assaults underscores the need for heightened vigilance amongst govt circles.

An infection Mechanism and Persistence

Android.Backdoor.916.origin employs an an infection mechanism tailor-made to social engineering and sideloading fairly than exploitation of software program vulnerabilities.

Examples of requested permissions (Supply – Dr.Net)

Victims obtain a malicious APK file disguised as “GuardCB.apk” by way of encrypted messenger threads. As soon as executed, the app’s manifest registers background companies and the Accessibility Service, as illustrated within the snippet under:-

By abusing the Accessibility API, the malware features keystroke logging and in-app information interception capabilities, guaranteeing enduring presence even after force-stop or gadget reboot sequences.

Steady well being checks and automated service restarts assure that the backdoor stays lively, silently harvesting information till manually eliminated.

Enhance your SOC and assist your crew defend your small business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Android, Antivirus, Attacking, Business, Disguised, Executives, Spyware

Post navigation

Previous Post: Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered
Next Post: Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure

Related Posts

Fortinet Confirms Critical FortiCloud SSO Vulnerability(CVE-2026-24858) Actively Exploited in the Wild Fortinet Confirms Critical FortiCloud SSO Vulnerability(CVE-2026-24858) Actively Exploited in the Wild Cyber Security News
ToolShell Exploit Chain Attacking SharePoint Servers to Gain Complete Control ToolShell Exploit Chain Attacking SharePoint Servers to Gain Complete Control Cyber Security News
Pakistani Actors Built 300+ Cracking Websites Used to Deliver Info-Stealer Malware Pakistani Actors Built 300+ Cracking Websites Used to Deliver Info-Stealer Malware Cyber Security News
CrowdStrike Fires Insider for Sharing Internal System Details with Hackers CrowdStrike Fires Insider for Sharing Internal System Details with Hackers Cyber Security News
Chrome 142 Released With Fix for 20 Vulnerabilities that Allows Malicious Code Execution Chrome 142 Released With Fix for 20 Vulnerabilities that Allows Malicious Code Execution Cyber Security News
Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News