Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps

Posted on September 25, 2025September 25, 2025 By CWS

A complicated cybercriminal marketing campaign has emerged concentrating on Indonesian and Vietnamese Android customers with banking trojans disguised as legit authorities identification functions and cost providers.

The malicious operation, energetic since roughly August 2024, employs superior evasion methods to ship variants of the BankBot trojan household whereas sustaining an in depth infrastructure of over 100 domains.

The menace actors reveal vital operational sophistication by means of their use of faux Google Play Retailer pages and authorities service functions similar to M-Pajak tax cost providers and digital identification verification techniques.

The marketing campaign exploits consumer belief in official authorities platforms, creating extremely convincing replicas that deceive victims into downloading malicious APK recordsdata containing banking trojans able to stealing delicate monetary info and credentials.

DomainTools analysts recognized the malware distribution sample by means of monitoring suspicious web site parts related to spoofed Google Play Retailer web sites.

The researchers uncovered an elaborate supply mechanism designed to bypass conventional community safety controls and evade automated detection techniques generally employed by cybersecurity frameworks.

Superior WebSocket-Based mostly Supply Mechanism

The menace actors make use of a remarkably refined malware supply system that leverages WebSocket know-how to bypass standard safety measures.

Relatively than offering direct obtain hyperlinks that safety scanners can simply detect, the malicious websites make the most of the Socket.IO library to determine real-time bidirectional communication channels between sufferer browsers and command servers.

Pretend verification apps (Supply -Domaintools)

When customers click on the Android obtain button, the system initiates a WebSocket connection utilizing the command socket. Emit(‘startDownload’, …).

The server responds by transmitting the malicious APK file in fragmented chunks somewhat than as a whole file switch.

The browser collects these fragments by means of occasion listeners coded as socket. On(‘chunk’, (chunk) => { chunks. Push(chunk); });, whereas concurrently receiving progress updates that keep the phantasm of a legit obtain course of.

Upon completion, the system combines all acquired chunks in reminiscence and assigns the MIME kind software/vnd.android.package-archive to create a correct APK file construction.

The supply mechanism then generates a short lived native URL and programmatically triggers an invisible obtain hyperlink, prompting the browser’s customary file obtain interface.

This elaborate course of successfully disguises malware distribution as encrypted WebSocket visitors, permitting malicious payloads to bypass community safety techniques configured to dam direct APK downloads whereas remaining invisible to static URL-based safety scanners that crawl web sites for malicious hyperlinks.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Android, Apps, Attacking, Banking, Government, Legitimate, Mimic, Payment, Trojans, Users

Post navigation

Previous Post: Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts
Next Post: BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features

Related Posts

Salesforce CLI Installer Vulnerability Let Attackers Execute Code and Gain SYSTEM-Level Access Cyber Security News
Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges Cyber Security News
Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely Cyber Security News
Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges Cyber Security News
Underground Ransomware Gang With New Tactics Against Organizations Worldwide Cyber Security News
Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark