Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Android Malware ‘Fantasy Hub’ Intercepts SMS Messages, Contacts and Call Logs

Posted on November 7, 2025November 7, 2025 By CWS

Russian-based risk actors are distributing a complicated Android Distant Entry Trojan via underground channels, providing it as a subscription service to different criminals.

The malware, recognized as Fantasy Hub, permits attackers to conduct widespread surveillance operations on compromised cellular units, stealing delicate communications and private info from unsuspecting customers.

The spyware and adware’s capabilities lengthen far past primary information theft, offering attackers with instruments to intercept two-factor authentication messages, entry banking credentials, and carry out real-time gadget monitoring.

Fantasy Hub operates beneath a Malware-as-a-Service mannequin, considerably reducing the technical boundaries for attackers with minimal experience.

Risk actors promote the malware on Russian-language channels and embrace hyperlinks to a Telegram bot that manages subscriptions and offers entry to the malware builder.

Commercial from the vendor (Supply – Zimperium)

The attackers check with compromised units and their house owners as “mammoths,” drawing customers into a complicated social engineering ecosystem that mixes phishing methods with technical sophistication.

Attackers obtain full documentation, together with video tutorials, on deploying the malware and bypassing safety restrictions.

Zimperium safety researchers recognized Fantasy Hub’s refined infrastructure, which features a Russian-language command and management panel and complete operational guides for attackers.

The malware’s focusing on technique particularly focuses on monetary establishments reminiscent of Alfa, PSB, Tbank, and Sber, the place operators deploy pretend login home windows to seize banking credentials.

This monetary focus underscores the intense risk posed to enterprise environments the place staff use cellular banking or delicate purposes on private units.

Technical Evasion Mechanisms

Fantasy Hub employs superior detection evasion techniques to stay hidden from safety evaluation.

The malware makes use of a local dropper embedded inside a metamask_loader library that decrypts an encrypted asset known as metadata.dat throughout runtime.

Sellers guiding the attackers on creating telegram channels to obtain notifications (Supply – Zimperium)

The decryption course of depends on a customized XOR encryption routine utilizing a set 36-byte key sample, adopted by gzip decompression via zlib.

This two-stage encryption method considerably reduces static indicators that conventional antivirus options would possibly detect.

The malware additional leverages the SMS handler position abuse method, much like ClayRat spyware and adware, consolidating a number of highly effective permissions together with contacts, digicam, and file entry right into a single authorization step.

The dropper masquerades as a Google Play Replace to decrease person suspicion, whereas current samples display root detection capabilities to evade dynamic evaluation environments.

Moreover, Fantasy Hub integrates WebRTC for establishing stay audio and video streaming channels, enabling real-time surveillance capabilities that considerably broaden the attacker’s reconnaissance potential past conventional information exfiltration strategies.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Call, Contacts, Fantasy, Hub, Intercepts, Logs, Malware, Messages, SMS

Post navigation

Previous Post: Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks
Next Post: New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model

Related Posts

New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys Cyber Security News
RapperBot Botnet Attack Peaks 50,000+ Attacks Targeting Network Edge Devices Cyber Security News
RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases Cyber Security News
HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack Cyber Security News
New Android Malware ClayRat Mimic as WhatsApp, Google Photos to Attack Users Cyber Security News
Internet Archive Abused for Hosting Stealthy JScript Loader Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark