Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features

Posted on December 8, 2025December 8, 2025 By CWS

Cybersecurity researchers have disclosed particulars of two new Android malware households dubbed FvncBot and SeedSnatcher, as one other upgraded model of ClayRat has been noticed within the wild.
The findings come from Intel 471, CYFIRMA, and Zimperium, respectively.
FvncBot, which masquerades as a safety app developed by mBank, targets cell banking customers in Poland. What’s notable concerning the malware is that it is utterly written from scratch and isn’t impressed by different Android banking trojans like ERMAC which have had their supply code leaked.
The malware “applied a number of options together with keylogging by abusing Android’s accessibility providers, web-inject assaults, display streaming and hidden digital community computing (HVNC) to carry out profitable monetary fraud,” Intel 471 stated.
Much like the lately uncovered Albiriox banking malware, the malware is protected by a crypting service generally known as apk0day that is supplied by Golden Crypt. The malicious app acts as a loader by putting in the embedded FvncBot payload.

As quickly because the dropper app is launched, customers are prompted to put in a Google Play part to make sure the safety and stability of the app, when, in actuality, it results in the deployment of the malware by making use of a session-based strategy that has been adopted by different menace actors to bypass accessibility restrictions on Android gadgets operating variations 13 and newer.
“Throughout the malware runtime, the log occasions had been despatched to the distant server on the naleymilva.it.com area to trace the present standing of the bot,” Intel 471 stated. “The operators included a construct identifier call_pl, which indicated Poland as a focused nation, and the malware model was set to 1.0-P, suggesting an early stage of improvement.

The malware then proceeds to ask the sufferer to grant it accessibility providers permissions, permitting it to function with elevated privileges and connect with an exterior server over HTTP to register the contaminated system and obtain instructions in return utilizing the Firebase Cloud Messaging (FCM) service.
FvncBot’s course of enabling the accessibility service
Among the assist features are listed under –

Begin/cease a WebSocket connection to remotely management the system and swipe, click on, or scroll to navigate the system’s display
Exfiltrate logged accessibility occasions to the controller
Exfiltrate record of put in functions
Exfiltrate system info and bot configuration
Obtain configuration to serve malicious overlays atop focused functions
Present a full display overlay to seize and exfiltrate delicate knowledge
Disguise an overlay
Verify accessibility providers standing
Abuse accessibility providers to log keystrokes
Fetch pending instructions from the controller
Abuse Android’s MediaProjection API to stream display content material

FvncBot additionally facilitates what’s referred to as a textual content mode to examine the system display structure and content material even in eventualities the place an app prevents screenshots from being taken by setting the FLAG_SECURE possibility.
It is at the moment not recognized how FvncBot is distributed, however Android banking trojans are recognized to leverage SMS phishing and third-party app shops as a propagation vector.
“Android’s accessibility service is meant to assist customers with disabilities, however it additionally can provide attackers the flexibility to know when sure apps are launched and overwrite the display’s show,” Intel 471 stated. “Though this specific pattern was configured to focus on Polish-speaking customers, it’s believable we are going to observe this theme shifting to focus on different areas or to impersonate different Polish establishments.”

Whereas FvncBot’s core focus is on knowledge theft, SeedSnatcher – distributed below the title Coin by means of Telegram – is designed to allow the theft of cryptocurrency pockets seed phrases. It additionally helps the flexibility to intercept incoming SMS messages to steal two-factor authentication (2FA) codes for account takeovers, in addition to seize system knowledge, contacts, name logs, information, and delicate knowledge by displaying phishing overlays.

It is assessed that the operators of SeedSnatcher are both China-based or Chinese language-speaking primarily based on the presence of Chinese language language directions shared by way of Telegram and the stealer’s management panel.
“The malware leverages superior methods to evade detection, together with dynamic class loading, stealthy WebView content material injection, and integer-based command-and-control directions,” CYFIRMA stated. “Whereas initially requesting minimal runtime permissions akin to SMS entry, it later escalates privileges to entry the Information supervisor, overlays, contacts, name logs, and extra.”
The developments come as Zimperium zLabs stated it found an improved model of ClayRat that has been up to date to abuse accessibility providers together with exploiting its default SMS permissions, making it a stronger menace able to recording keystrokes and the display, serving totally different overlays like a system replace display to hide malicious exercise, and creating faux interactive notifications to steal victims’ responses.
ClayRat’s default SMS and accessibility permission
The growth in ClayRat’s capabilities, in a nutshell, facilitates full system takeover by means of accessibility providers abuse, automated unlocking of system PIN/password/sample, display recording, notification harvesting, and protracted overlays.
ClayRat has been disseminated by way of 25 fraudulent phishing domains that impersonate official providers like YouTube, promoting a Professional model for background playback and 4K HDR assist. Dropper apps distributing the malware have additionally been discovered to imitate Russian taxi and parking functions.
“Collectively, these capabilities make ClayRat a extra harmful spy ware in comparison with its earlier model the place the sufferer might uninstall the appliance or flip off the system upon detecting the an infection,” researchers Vishnu Pratapagiri and Fernando Ortega stated.

The Hacker News Tags:Android, ClayRat, Data, Features, FvncBot, Gain, Malware, SeedSnatcher, Stronger, Theft

Post navigation

Previous Post: Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes
Next Post: Tri-Century Eye Care Data Breach Impacts 200,000 Individuals

Related Posts

How Passwork 7 Addresses Complexity of Enterprise Security The Hacker News
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs The Hacker News
U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme The Hacker News
Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets The Hacker News
Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network The Hacker News
Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
  • Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
  • Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes
  • OceanLotus Hacker Group Targeting Xinchuang IT Ecosystems to Launch Supply Chain Attacks
  • Critical Apache Tika Vulnerability Leads to XXE Injection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
  • Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
  • Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes
  • OceanLotus Hacker Group Targeting Xinchuang IT Ecosystems to Launch Supply Chain Attacks
  • Critical Apache Tika Vulnerability Leads to XXE Injection

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark