Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hugging Face Abused to Deploy Android RAT

Posted on January 30, 2026January 30, 2026 By CWS

The Hugging Face infrastructure has been abused for the supply of an Android distant entry trojan (RAT), Bitdefender reviews.

The assault chain begins with an advert or a immediate to obtain and set up a safety utility claiming to supply a number of helpful options.

The appliance, referred to as TrustBastion, acts as a dropper and instantly after launch prompts the person to fetch an replace, displaying legitimate-looking Google Play and Android system replace dialogs.

As soon as the person agrees, the dropper connects to an encrypted endpoint hosted at trustbastion[.]com, which serves an HTML web page that factors to a Hugging Face repository, after which downloads a malicious payload from the web platform’s datasets.

Based on Bitdefender, the Hugging Face repository used within the assault was roughly a month-old when taken offline and had over 6,000 commits. New payloads have been being generated roughly each quarter-hour, the cybersecurity agency says.

“The repository finally went offline, however just for the complete operation to maneuver to a different hyperlink, with the challenge utilizing completely different icons and a few minor changes. The code remained the identical,” Bitdefender explains.Commercial. Scroll to proceed studying.

After set up, the malicious payload requested broad permissions, pretending to be a safety function, and guided the person to allow Accessibility Providers to observe their actions.

It additionally requested permissions to report the display, carry out display casting, and show overlays, enabling it to look at, seize, and modify on-screen content material in actual time.

As soon as permissions are enabled, the malware can management contaminated gadgets and exfiltrate display content material to the command-and-control (C&C) server.

“The malware additionally shows fraudulent authentication interfaces designed to reap delicate credentials. It tries to impersonate widespread monetary and fee companies, together with Alipay and WeChat,” Bitdefender says.

Moreover, the malware may seize lock display data and authentication actions, and was seen sustaining persistent communication with the C&C and downloading webviews to imitate professional performance.

“This infrastructure is used to obtain instructions, transmit stolen information and ship up to date configuration data to contaminated gadgets. The identical infrastructure additionally facilitates payload redirection by serving Hugging Face obtain hyperlinks to the preliminary dropper,” Bitdefender says.

Quickly after the repository internet hosting TrustBastion disappeared on the finish of December, one other repository emerged, internet hosting Premium Membership, a seemingly completely different app that has the identical underlying code. Hugging Face took down the datasets serving the malware, Bitdefender says.

Associated: Kimwolf Android Botnet Grows Via Residential Proxy Networks

Associated: New $150 Cellik RAT Grants Android Management, Trojanizes Google Play Apps

Associated: New Albiriox Android Malware Developed by Russian Cybercriminals

Associated: Landfall Android Spy ware Focused Samsung Telephones by way of Zero-Day

Security Week News Tags:Abused, Android, Deploy, Face, Hugging, RAT

Post navigation

Previous Post: ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
Next Post: GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details

Related Posts

Police in Brazil Arrest a Suspect Over $100M Banking Hack Security Week News
WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users Security Week News
In Other News: iOS 26 Deletes Spyware Evidence, Shadow Escape Attack, Cyber Exec Sold Secrets to Russia Security Week News
CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future? Security Week News
Telecom Giant Orange Hit by Cyberattack Security Week News
Cloudflare Puts a Default Block on AI Web Scraping Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access
  • White House Scraps ‘Burdensome’ Software Security Rules 
  • China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
  • Badges, Bytes and Blackmail
  • GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access
  • White House Scraps ‘Burdensome’ Software Security Rules 
  • China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
  • Badges, Bytes and Blackmail
  • GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark