Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Godfather Android Trojan Creates Sandbox on Infected Devices

Posted on June 20, 2025June 20, 2025 By CWS

A latest model of the Godfather Android trojan is deploying a sandbox on the contaminated gadgets to hijack banking and cryptocurrency functions, cellular safety agency Zimperium warns.

Energetic since at the very least June 2021 and believed to be primarily based on leaked Anubis banking trojan code, Godfather is understood for concentrating on a whole bunch of banking and cryptocurrency functions worldwide with internet overlays.

A not too long ago recognized iteration of the malware takes its info stealing capabilities to a brand new degree by way of the deployment of a whole virtualization framework on contaminated gadgets, which is used to run copies of the focused functions within the managed sandbox.

Godfather makes use of open supply instruments equivalent to Virtualapp, Xposedbridge, XposedInstaller, and Xposed, which assist app virtualization, to execute the brand new overlay assaults. A number app is used to load the hijacked functions, that are put in on a digital filesystem.

The malware creates an inventory of functions put in on the Android gadget, and extracts important info from banking functions to create a cache file it then makes use of to launch the apps within the sandbox.

“When a consumer launches their app, they’re seamlessly redirected to this virtualized occasion, the place each motion, faucet, and information entry is monitored and managed by the malware at runtime,” Zimperium explains.

The strategy offers attackers with whole visibility into the consumer’s actions, permitting them to intercept delicate info and credentials in actual time. Moreover, they’ll management the malware remotely to switch the virtualized app’s habits and bypass safety checks.

“Crucially, as a result of the consumer is interacting with the actual, unaltered utility, the assault achieves excellent deception, making it almost not possible to detect by way of visible inspection and neutralizing consumer vigilance,” Zimperium notes.Commercial. Scroll to proceed studying.

The newest malware iteration was additionally seen altering the ZIP format of APK information and modifying Android Manifest file construction to evade detection. Nonetheless, it continues to make use of Android’s accessibility providers and to trick customers into granting it the permissions it must conduct nefarious actions.

Zimperium additionally noticed the malware utilizing varied hooks to steal delicate info, and concentrating on gadget lock credentials, together with lock patterns, PINs, and passwords.

The safety agency has seen the virtualization approach getting used towards roughly a dozen Turkish monetary establishments, however warns that Godfather can goal near 500 functions, together with banking, cryptocurrency, communication, e-commerce, social media, and providers apps.

Associated: ‘Crocodilus’ Android Banking Trojan Permits Machine Takeover, Knowledge Theft

Associated: Recent Grandoreiro Banking Trojan Campaigns Goal Latin America, Europe

Associated: ‘DroidBot’ Android Trojan Targets Banking, Cryptocurrency Purposes

Associated: Android Banking Trojan ToxicPanda Targets Europe

Security Week News Tags:Android, Creates, Devices, Godfather, Infected, Sandbox, Trojan

Post navigation

Previous Post: Motors Theme Vulnerability Exploited to Hack WordPress Websites
Next Post: Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist

Related Posts

Train Hack Gets Proper Attention After 20 Years: Researcher  Security Week News
Suspected DoppelPaymer Ransomware Group Member Arrested Security Week News
SentinelOne to Acquire Observo AI in $225 Million Deal Security Week News
The Cybersecurity Information Sharing Act Faces Expiration Security Week News
Canadian Airline WestJet Hit by Cyberattack Security Week News
Chrome 136 Update Patches Vulnerability With ‘Exploit in the Wild’ Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity Weekly Recap – PornHub Breach, Cisco 0-Day, Amazon Detains DPRK IT Worker, and more
  • Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
  • 100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild
  • Claude Opus 4.5 Now Integrated with GitHub Copilot
  • Microsoft Rolls Out Baseline Security Mode for Office, SharePoint, Exchange, Teams, and Entra

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity Weekly Recap – PornHub Breach, Cisco 0-Day, Amazon Detains DPRK IT Worker, and more
  • Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence
  • 100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild
  • Claude Opus 4.5 Now Integrated with GitHub Copilot
  • Microsoft Rolls Out Baseline Security Mode for Office, SharePoint, Exchange, Teams, and Entra

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark