Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hugging Face Abused to Deploy Android RAT

Posted on January 30, 2026January 30, 2026 By CWS

The Hugging Face infrastructure has been abused for the supply of an Android distant entry trojan (RAT), Bitdefender reviews.

The assault chain begins with an advert or a immediate to obtain and set up a safety utility claiming to supply a number of helpful options.

The appliance, referred to as TrustBastion, acts as a dropper and instantly after launch prompts the person to fetch an replace, displaying legitimate-looking Google Play and Android system replace dialogs.

As soon as the person agrees, the dropper connects to an encrypted endpoint hosted at trustbastion[.]com, which serves an HTML web page that factors to a Hugging Face repository, after which downloads a malicious payload from the web platform’s datasets.

Based on Bitdefender, the Hugging Face repository used within the assault was roughly a month-old when taken offline and had over 6,000 commits. New payloads have been being generated roughly each quarter-hour, the cybersecurity agency says.

“The repository finally went offline, however just for the complete operation to maneuver to a different hyperlink, with the challenge utilizing completely different icons and a few minor changes. The code remained the identical,” Bitdefender explains.Commercial. Scroll to proceed studying.

After set up, the malicious payload requested broad permissions, pretending to be a safety function, and guided the person to allow Accessibility Providers to observe their actions.

It additionally requested permissions to report the display, carry out display casting, and show overlays, enabling it to look at, seize, and modify on-screen content material in actual time.

As soon as permissions are enabled, the malware can management contaminated gadgets and exfiltrate display content material to the command-and-control (C&C) server.

“The malware additionally shows fraudulent authentication interfaces designed to reap delicate credentials. It tries to impersonate widespread monetary and fee companies, together with Alipay and WeChat,” Bitdefender says.

Moreover, the malware may seize lock display data and authentication actions, and was seen sustaining persistent communication with the C&C and downloading webviews to imitate professional performance.

“This infrastructure is used to obtain instructions, transmit stolen information and ship up to date configuration data to contaminated gadgets. The identical infrastructure additionally facilitates payload redirection by serving Hugging Face obtain hyperlinks to the preliminary dropper,” Bitdefender says.

Quickly after the repository internet hosting TrustBastion disappeared on the finish of December, one other repository emerged, internet hosting Premium Membership, a seemingly completely different app that has the identical underlying code. Hugging Face took down the datasets serving the malware, Bitdefender says.

Associated: Kimwolf Android Botnet Grows Via Residential Proxy Networks

Associated: New $150 Cellik RAT Grants Android Management, Trojanizes Google Play Apps

Associated: New Albiriox Android Malware Developed by Russian Cybercriminals

Associated: Landfall Android Spy ware Focused Samsung Telephones by way of Zero-Day

Security Week News Tags:Abused, Android, Deploy, Face, Hugging, RAT

Post navigation

Previous Post: ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
Next Post: GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details

Related Posts

Counter Antivirus Service AVCheck Shut Down by Law Enforcement Security Week News
Two Exploited Vulnerabilities Patched in Android Security Week News
In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed Security Week News
ConductorOne Raises $79 Million in Series B Funding Security Week News
Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data  Security Week News
Rising Tides: When Cybersecurity Becomes Personal – Inside the Work of an OSINT Investigator Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • White House Scraps ‘Burdensome’ Software Security Rules 
  • Badges, Bytes and Blackmail
  • GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details
  • Hugging Face Abused to Deploy Android RAT
  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • White House Scraps ‘Burdensome’ Software Security Rules 
  • Badges, Bytes and Blackmail
  • GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details
  • Hugging Face Abused to Deploy Android RAT
  • ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark