Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Godfather Android Trojan Creates Sandbox on Infected Devices

Godfather Android Trojan Creates Sandbox on Infected Devices

Posted on June 20, 2025June 20, 2025 By CWS

A latest model of the Godfather Android trojan is deploying a sandbox on the contaminated gadgets to hijack banking and cryptocurrency functions, cellular safety agency Zimperium warns.

Energetic since at the very least June 2021 and believed to be primarily based on leaked Anubis banking trojan code, Godfather is understood for concentrating on a whole bunch of banking and cryptocurrency functions worldwide with internet overlays.

A not too long ago recognized iteration of the malware takes its info stealing capabilities to a brand new degree by way of the deployment of a whole virtualization framework on contaminated gadgets, which is used to run copies of the focused functions within the managed sandbox.

Godfather makes use of open supply instruments equivalent to Virtualapp, Xposedbridge, XposedInstaller, and Xposed, which assist app virtualization, to execute the brand new overlay assaults. A number app is used to load the hijacked functions, that are put in on a digital filesystem.

The malware creates an inventory of functions put in on the Android gadget, and extracts important info from banking functions to create a cache file it then makes use of to launch the apps within the sandbox.

“When a consumer launches their app, they’re seamlessly redirected to this virtualized occasion, the place each motion, faucet, and information entry is monitored and managed by the malware at runtime,” Zimperium explains.

The strategy offers attackers with whole visibility into the consumer’s actions, permitting them to intercept delicate info and credentials in actual time. Moreover, they’ll management the malware remotely to switch the virtualized app’s habits and bypass safety checks.

“Crucially, as a result of the consumer is interacting with the actual, unaltered utility, the assault achieves excellent deception, making it almost not possible to detect by way of visible inspection and neutralizing consumer vigilance,” Zimperium notes.Commercial. Scroll to proceed studying.

The newest malware iteration was additionally seen altering the ZIP format of APK information and modifying Android Manifest file construction to evade detection. Nonetheless, it continues to make use of Android’s accessibility providers and to trick customers into granting it the permissions it must conduct nefarious actions.

Zimperium additionally noticed the malware utilizing varied hooks to steal delicate info, and concentrating on gadget lock credentials, together with lock patterns, PINs, and passwords.

The safety agency has seen the virtualization approach getting used towards roughly a dozen Turkish monetary establishments, however warns that Godfather can goal near 500 functions, together with banking, cryptocurrency, communication, e-commerce, social media, and providers apps.

Associated: ‘Crocodilus’ Android Banking Trojan Permits Machine Takeover, Knowledge Theft

Associated: Recent Grandoreiro Banking Trojan Campaigns Goal Latin America, Europe

Associated: ‘DroidBot’ Android Trojan Targets Banking, Cryptocurrency Purposes

Associated: Android Banking Trojan ToxicPanda Targets Europe

Security Week News Tags:Android, Creates, Devices, Godfather, Infected, Sandbox, Trojan

Post navigation

Previous Post: Motors Theme Vulnerability Exploited to Hack WordPress Websites
Next Post: Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist

Related Posts

Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison  Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison  Security Week News
Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities Security Week News
ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid Security Week News
Beyond GenAI: Why Agentic AI Was the Real Conversation at RSA 2025 Beyond GenAI: Why Agentic AI Was the Real Conversation at RSA 2025 Security Week News
Microsoft Bug Bounty Program Expanded to Third-Party Code Microsoft Bug Bounty Program Expanded to Third-Party Code Security Week News
High-Severity Flaws Patched in Chrome, Firefox High-Severity Flaws Patched in Chrome, Firefox Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybercrime Trends: Codespaces Exploits and More
  • DragonForce Ransomware Threatens Global Business Security
  • AI Scam Unveils 150 Fake Law Firm Websites
  • Iranian Infy Hackers Reactivate C2 Servers After Internet Blackout
  • Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybercrime Trends: Codespaces Exploits and More
  • DragonForce Ransomware Threatens Global Business Security
  • AI Scam Unveils 150 Fake Law Firm Websites
  • Iranian Infy Hackers Reactivate C2 Servers After Internet Blackout
  • Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark