Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Godfather Android Trojan Creates Sandbox on Infected Devices

Posted on June 20, 2025June 20, 2025 By CWS

A latest model of the Godfather Android trojan is deploying a sandbox on the contaminated gadgets to hijack banking and cryptocurrency functions, cellular safety agency Zimperium warns.

Energetic since at the very least June 2021 and believed to be primarily based on leaked Anubis banking trojan code, Godfather is understood for concentrating on a whole bunch of banking and cryptocurrency functions worldwide with internet overlays.

A not too long ago recognized iteration of the malware takes its info stealing capabilities to a brand new degree by way of the deployment of a whole virtualization framework on contaminated gadgets, which is used to run copies of the focused functions within the managed sandbox.

Godfather makes use of open supply instruments equivalent to Virtualapp, Xposedbridge, XposedInstaller, and Xposed, which assist app virtualization, to execute the brand new overlay assaults. A number app is used to load the hijacked functions, that are put in on a digital filesystem.

The malware creates an inventory of functions put in on the Android gadget, and extracts important info from banking functions to create a cache file it then makes use of to launch the apps within the sandbox.

“When a consumer launches their app, they’re seamlessly redirected to this virtualized occasion, the place each motion, faucet, and information entry is monitored and managed by the malware at runtime,” Zimperium explains.

The strategy offers attackers with whole visibility into the consumer’s actions, permitting them to intercept delicate info and credentials in actual time. Moreover, they’ll management the malware remotely to switch the virtualized app’s habits and bypass safety checks.

“Crucially, as a result of the consumer is interacting with the actual, unaltered utility, the assault achieves excellent deception, making it almost not possible to detect by way of visible inspection and neutralizing consumer vigilance,” Zimperium notes.Commercial. Scroll to proceed studying.

The newest malware iteration was additionally seen altering the ZIP format of APK information and modifying Android Manifest file construction to evade detection. Nonetheless, it continues to make use of Android’s accessibility providers and to trick customers into granting it the permissions it must conduct nefarious actions.

Zimperium additionally noticed the malware utilizing varied hooks to steal delicate info, and concentrating on gadget lock credentials, together with lock patterns, PINs, and passwords.

The safety agency has seen the virtualization approach getting used towards roughly a dozen Turkish monetary establishments, however warns that Godfather can goal near 500 functions, together with banking, cryptocurrency, communication, e-commerce, social media, and providers apps.

Associated: ‘Crocodilus’ Android Banking Trojan Permits Machine Takeover, Knowledge Theft

Associated: Recent Grandoreiro Banking Trojan Campaigns Goal Latin America, Europe

Associated: ‘DroidBot’ Android Trojan Targets Banking, Cryptocurrency Purposes

Associated: Android Banking Trojan ToxicPanda Targets Europe

Security Week News Tags:Android, Creates, Devices, Godfather, Infected, Sandbox, Trojan

Post navigation

Previous Post: Motors Theme Vulnerability Exploited to Hack WordPress Websites
Next Post: Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist

Related Posts

Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks Security Week News
Trustifi Raises $25 Million for AI-Powered Email Security Security Week News
With Retail Cyberattacks on the Rise, Customers Find Orders Blocked and Shelves Empty Security Week News
CISA Releases Guidance on SIEM and SOAR Implementation Security Week News
Critical Flaw Allows Remote Hacking of AutomationDirect Industrial Gateway Security Week News
Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer
  • Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • Godfather Android Trojan Creates Sandbox on Infected Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer
  • Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • Godfather Android Trojan Creates Sandbox on Infected Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News