Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data

New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data

Posted on August 5, 2025August 5, 2025 By CWS

A complicated new Android malware marketing campaign has emerged focusing on Indian banking prospects by convincing impersonations of common monetary purposes.

The malicious software program masquerades as reputable apps from main Indian monetary establishments, together with SBI Card, Axis Financial institution, Indusind Financial institution, ICICI, and Kotak, deceiving customers into downloading pretend purposes that steal delicate monetary data.

The malware operates by rigorously crafted phishing web sites that carefully replicate official banking portals, incorporating genuine visible components and branding to ascertain credibility.

Phishing web site (Supply – McAfee)

These fraudulent websites characteristic distinguished “Get App” and “Obtain” buttons that immediate unsuspecting customers to put in malicious APK information disguised as official banking purposes.

The marketing campaign particularly targets Hindi-speaking customers throughout India, leveraging cultural and linguistic familiarity to reinforce its misleading effectiveness.

McAfee researchers recognized this risk as significantly harmful resulting from its dual-purpose structure that mixes conventional banking fraud with cryptocurrency mining capabilities.

The malware not solely harvests private and monetary knowledge but in addition silently mines Monero cryptocurrency on contaminated units, maximizing the attackers’ monetary features from every compromised gadget.

What distinguishes this marketing campaign from standard banking trojans is its subtle evasion mechanisms and distant activation capabilities.

Upon set up, the malware presents customers with a pretend Google Play Retailer interface suggesting an app replace is required.

Preliminary display screen proven by the dropper app (Supply – McAfee)

This misleading tactic builds consumer confidence whereas the malware prepares its malicious payload.

Superior Payload Supply and Execution Mechanism

The malware employs a complicated two-stage payload supply system designed to evade static evaluation and detection.

Initially functioning as a dropper, the applying shops an encrypted DEX file inside its belongings folder, which serves because the first-stage loader part.

This encrypted payload is obfuscated utilizing XOR encryption, stopping rapid detection by safety scanners.

The primary-stage loader decrypts and dynamically hundreds a second encrypted file containing the precise malicious payload.

This layered method ensures that no clearly malicious code seems in the principle APK file, complicating forensic evaluation and automatic detection methods.

Pretend card verification display screen (Supply – McAfee)

As soon as the ultimate payload executes, it presents victims with convincing pretend banking interfaces that seize delicate data together with card numbers, CVV codes, and private particulars.

The cryptocurrency mining performance operates by Firebase Cloud Messaging, permitting attackers to remotely set off mining operations utilizing XMRig software program.

The malware downloads encrypted mining binaries from hardcoded URLs and executes them utilizing ProcessBuilder, producing Monero cryptocurrency whereas remaining largely undetected on contaminated units.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:Android, Apps, Axis, Bank, Card, Data, Financial, Malware, Mimics, SBI, Steal, Users

Post navigation

Previous Post: NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control
Next Post: 15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign

Related Posts

Researchers Manipulate Stolen Data to Corrupt AI Models and Generate Inaccurate Outputs Researchers Manipulate Stolen Data to Corrupt AI Models and Generate Inaccurate Outputs Cyber Security News
‘SyncFuture’ Campaign Weaponizing Legitimate Enterprise Security Software to Deploy Malware ‘SyncFuture’ Campaign Weaponizing Legitimate Enterprise Security Software to Deploy Malware Cyber Security News
10 Best Virtual Machine (VM) Monitoring Tools in 2025 10 Best Virtual Machine (VM) Monitoring Tools in 2025 Cyber Security News
Google Announces Public Preview of Alert Triage and Investigation Agent used in Google Security Operations Google Announces Public Preview of Alert Triage and Investigation Agent used in Google Security Operations Cyber Security News
CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild Cyber Security News
CastleLoader Malware Infected Over 400+ Devices Using Cloudflare-Themed ClickFix Phishing Attack CastleLoader Malware Infected Over 400+ Devices Using Cloudflare-Themed ClickFix Phishing Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical TP-Link Vulnerabilities Demand Immediate Firmware Updates
  • CISA Alerts on VMware ESXi Vulnerability in Ransomware
  • Cybercriminals Exploit Cloud Services for Phishing
  • Addressing SOC False Negatives with Interactive Analysis
  • Interlock Ransomware Utilizes Zero-Day to Evade Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical TP-Link Vulnerabilities Demand Immediate Firmware Updates
  • CISA Alerts on VMware ESXi Vulnerability in Ransomware
  • Cybercriminals Exploit Cloud Services for Phishing
  • Addressing SOC False Negatives with Interactive Analysis
  • Interlock Ransomware Utilizes Zero-Day to Evade Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark