Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Banking Malware DoubleTrouble Attacking Users Via Phishing Sites To Steal Banking Credentials

Posted on July 31, 2025August 1, 2025 By CWS

A complicated new banking trojan dubbed DoubleTrouble has emerged as a major menace to cellular customers throughout Europe, using superior evasion strategies and increasing its assault floor by means of novel distribution channels.

The malware initially unfold by means of phishing web sites impersonating well-known European banking establishments, however has lately developed to leverage bogus web sites internet hosting malicious samples instantly inside Discord channels.

DoubleTrouble represents a regarding evolution in cellular banking malware, combining conventional overlay assaults with cutting-edge capabilities together with complete display screen recording, superior keylogging, and real-time gadget manipulation.

The trojan’s refined method entails disguising itself as authentic Google Play extensions whereas secretly deploying its malicious payload from the app’s Sources/uncooked listing.

As soon as put in, the malware exploits Android’s Accessibility Providers to execute fraudulent actions with unprecedented stealth and effectiveness.

Layouts proven to the person throughout set up (Supply – Zimperium)

Safety researchers at Zimperium recognized this banking trojan throughout in depth monitoring operations, amassing 25 samples of earlier variants and 9 samples from the present marketing campaign.

The analysis group’s evaluation revealed the malware’s fast evolution in each distribution strategies and technical capabilities, marking it as probably the most refined banking trojans noticed in latest months.

The malware’s impression extends past conventional credential theft, incorporating options that allow attackers to realize full management over contaminated gadgets.

DoubleTrouble can seize display screen content material in real-time, monitor each keystroke, block authentic banking functions, and current convincing faux interfaces designed to reap delicate monetary data.

Pretend UI’s created by the malware to steal gadget lockscreen (Supply – Zimperium)

These capabilities place the malware as a formidable menace able to bypassing trendy safety measures and multi-factor authentication programs.

Superior Display Recording and Information Exfiltration Mechanism

DoubleTrouble’s most regarding characteristic lies in its refined display screen recording functionality, which leverages Android’s MediaProjection and VirtualDisplay APIs to realize complete visible surveillance.

The malware initiates this course of by requesting display screen seize permissions by means of a rigorously hid exercise, minimizing the probability of person detection.

As soon as permission is granted, the trojan creates a digital show that capabilities as a real-time mirror of the person’s lively display screen.

System upkeep overlay proven on high of the appliance to dam (Supply – Zimperium)

The technical implementation entails using an ImageReader to seize particular person frames from the digital show, that are subsequently transformed to JPEG format and encoded into base64 strings.

This encoded visible knowledge is then encapsulated inside JSON objects containing metadata comparable to display screen dimensions and picture format specs.

The whole payload is transmitted to the command and management server, offering attackers with an unobstructed view of all person actions together with banking transactions, cryptocurrency operations, and password supervisor interactions.

DoubleTrouble Full Command Set:-

CommandDescriptionhomeWakes the gadget utilizing a hidden wake lock if the display screen is off, or simulates a House button press by way of Accessibility if the display screen is onclickClicks on X and Y place on the display screen by way of Accessibility service gesture to simulate contact eventsswipe_pathDraw a path throughout particular display screen coordinates utilizing accessibility or contact automationstart_skeletonStarts to seize screenshot-like skeleton view of the present UI, renders it to canvas, and sends it as a Base64 imagestop_skeletonStops sending and units the flag to falseget_screen_locksRetrieves saved sample, PIN, and password lock varieties from shared preferencespingPings to ascertain the communication with c2html_injectionRetrieves the html injection from server and shops in cache folderclear_injection_cacheClears the saved injection in app_cache_dataget_cached_injectionsCollects cached injection knowledge html recordsdata saved in shared preferencessend_pinShows a faux display screen to steal pinsend_patternShows a faux display screen to steal patternsend_passwordShows a faux display screen to steal passwordcustom_htmlWrites the ‘html’ string from the JSON or ‘No HTML Discovered!’ if lacking right into a temp.html file within the cacheblock_appBlocks a specific app acquired from server and exhibits upkeep screenunblock_appUnblocks the apppush_notificationPosts a notification with title, content material, and an intent to open both a URL or appstart_graphicalStarts display screen capturestop_graphicalStops display screen capturestart_antiEnables a protecting flag and scans UI components for particular textual content to set off automated actionsstop_antiDisables a protecting flag and stops automated scanningbackSimulates a again button pressrecentSimulates a House button press by way of the accessibilitylockSimulates urgent the Recents button by way of accessibility servicemuteMutes the audio within the deviceopen_appOpens a specific bundle acquired from serveropen_propertiesOpens the App Data display screen for a selected bundle in system settingsopen_play_protectOpens Google Play Defend’s ‘Confirm Apps’ settings display screen, and exhibits a toast if the exercise isn’t availableget_eventsSends a JSON payload containing the saved ‘beats’ knowledge as an ‘events_list’ command if the info existsenable_black_onDisplay a full black display screen overlayenable_black_offRemoves the black overlay viewenable_update_onDisplays an overlay with faux replace with a message ‘Gadget replace began’, ‘Don’t contact’enable_update_offRemoves the replace overlayenable_html_onCreates an overlay window that covers all the display screen and exhibits a WebView inside it with the given HTML contentenable_html_offRemoved the overlay viewget_screen_sizeGets the display screen width and top and writes to shared preferences

This surveillance mechanism operates silently within the background, capturing delicate data as customers work together with authentic functions.

The malware’s capacity to file precisely what customers see permits attackers to bypass conventional safety measures, intercept one-time passwords, and achieve entry to extremely confidential monetary knowledge by means of visible remark somewhat than direct software compromise.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:Attacking, Banking, Credentials, DoubleTrouble, Malware, Phishing, Sites, Steal, Users

Post navigation

Previous Post: How to Review Privacy Policies Efficiently
Next Post: First AI-Powered Malware LAMEHUG Attacking Organizations With Compromised Official Email Account

Related Posts

Dark Partners Hackers Group Wiping Crypto Wallets With Fake Ai Tools and VPN Services Cyber Security News
Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence Cyber Security News
KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique Cyber Security News
Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Cyber Security News
Microsoft Details Scattered Spider TTPs Observed in Recent Attack Chains Cyber Security News
Critical VMware Tools VGAuth Vulnerabilities Enable Full System Access for Attackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News