Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft

Posted on June 19, 2025June 19, 2025 By CWS

Cybersecurity researchers have uncovered the inside workings of an Android malware known as AntiDot that has compromised over 3,775 units as a part of 273 distinctive campaigns.
“Operated by the financially motivated risk actor LARVA-398, AntiDot is actively offered as a Malware-as-a-Service (MaaS) on underground boards and has been linked to a variety of cellular campaigns,” PRODAFT stated in a report shared with The Hacker Information.
AntiDot is marketed as a “three-in-one” resolution with capabilities to file the gadget display by abusing Android’s accessibility providers, intercept SMS messages, and extract delicate information from third-party purposes.
The Android botnet is suspected to be delivered through malicious promoting networks or by way of extremely tailor-made phishing campaigns based mostly on exercise that signifies selective concentrating on of victims based mostly on language and geographic location.
AntiDot was first publicly documented in Could 2024 after it was noticed being distributed as Google Play updates to perform its info theft targets.
Like different Android trojans, it options a variety of capabilities to conduct overlay assaults, log keystrokes, and remotely management contaminated units utilizing Android’s MediaProjection API. It additionally establishes a WebSocket communication to facilitate real-time, bi-directional communication between the contaminated gadget and an exterior server.
In December 2024, Zimperium revealed particulars of a cellular phishing marketing campaign that distributed an up to date model of AntiDot dubbed AppLite Banker utilizing job offer-themed decoys.
The newest findings from the Swiss cybersecurity firm present that there are at the very least 11 lively command-and-control (C2) servers in operation which might be overseeing at least 3,775 contaminated units throughout 273 distinct campaigns.
A Java-based malware at its core, AntiDot is closely obfuscated utilizing a business packer to sidestep detection and evaluation efforts. The malware, per PRODAFT, is delivered as a part of a three-stage course of that begins with an APK file.
“An inspection of the AndroidManifest file reveals that many class names don’t seem within the authentic APK,” the corporate stated. “These lacking lessons are dynamically loaded by the packer throughout set up, and embrace malicious code extracted from an encrypted file. All the mechanism is deliberately crafted to keep away from detection by antivirus instruments.”

As soon as launched, it serves a bogus replace bar and prompts the sufferer to grant it accessibility permissions, after which it unpacks and masses a DEX file incorporating the botnet capabilities.
A core characteristic of AntiDot is its means to watch for newly launched purposes and serve and serve a bogus login display from the C2 server when the sufferer opens a cryptocurrency- or payment-related app that the operators are eager about.
The malware additionally abuses accessibility providers to collect intensive details about the contents of the lively screens and units itself because the default SMS app for capturing incoming and outgoing texts. Moreover, it might probably monitor telephone calls, block calls from particular numbers, or redirect them, successfully opening up extra avenues for fraud.

One other necessary characteristic is that it might probably maintain observe of real-time notifications displayed within the gadget’s standing bar and takes steps to both dismiss or snooze them in a bid to suppress alerts and keep away from alerting the consumer of suspicious exercise.

PRODAFT stated the C2 panel that powers the distant management capabilities is constructed utilizing MeteorJS, an open-source JavaScript framework that allows real-time communication. The panel has six completely different tabs –

Bots, which shows a listing of all of the compromised units and their particulars
Injects, which shows a listing of all goal apps for overlay injection and consider the overlay template for every inject
Analytic, which shows a listing of purposes put in on sufferer units and certain used to determine new and fashionable apps for future concentrating on
Settings, which comprises the core configuration choices for the panel, together with updating the injects
Gates, which is used to handle the infrastructure endpoints that the bots connect with
Assist, which gives help sources for utilizing the malware

“AntiDot represents a scalable and evasive MaaS platform designed for monetary acquire by way of persistent management of cellular units, particularly in localized and language-specific areas,” the corporate stated. “The malware additionally employs WebView injection and overlay assaults to steal credentials, making it a critical risk to consumer privateness and gadget safety.”
GodFather Returns
The event as Zimperium zLabs stated it uncovered a “refined evolution” of the GodFather Android banking trojan that makes use of on-device virtualization to hijack respectable cellular banking and cryptocurrency purposes and perform real-time fraud.

“The core of this novel approach is the malware’s means to create an entire, remoted digital surroundings on the sufferer’s gadget. As an alternative of merely mimicking a login display, the malware installs a malicious ‘host’ utility that comprises a virtualization framework,” researchers Fernando Ortega and Vishnu Pratapagiri stated.
“This host then downloads and runs a replica of the particular focused banking or cryptocurrency app inside its managed sandbox.”
Ought to the sufferer launch the app, they’re redirected to the digital occasion, from the place their actions are monitored by the risk actors. As well as, the newest model of GodFather packs in options to bypass static evaluation instruments by making use of ZIP manipulation and filling the AndroidManifest file with irrelevant permissions.
Like within the case of AntiDot, GodFather depends on accessibility providers to conduct its info gathering actions and management compromised units. Whereas Google has enforced safety protections that forestall sideloaded apps from enabling accessibility service beginning Android 13, a session-based set up strategy can get round this safeguard.
The session-based technique is utilized by Android app shops to deal with app set up, as do texting apps, mail shoppers, and browsers when offered with APK information.
Central to the functioning of the malware is its virtualization characteristic. Within the first stage, it collects details about the record of put in apps and checks if it contains any of the predetermined apps it is configured to focus on.

If matches are discovered, it extracts related info from these apps after which proceeds to put in a replica of these apps in a digital surroundings contained in the dropper app. Thus when the sufferer makes an attempt to launch the precise banking utility on their gadget, GodFather intercepts the motion and opens the virtualized occasion as an alternative.
It is value mentioning that related virtualization options had been beforehand flagged in one other Android malware codenamed FjordPhantom, which was documented by Promon in December 2023. The strategy represents a paradigm shift in cellular risk capabilities that transcend the standard overlay tactic to steal credentials and different delicate information.
“Whereas this GodFather marketing campaign casts a large internet, concentrating on almost 500 purposes globally, our evaluation reveals that this extremely refined virtualization assault is at the moment targeted on a dozen Turkish monetary establishments,” the corporate stated.
“A very alarming functionality uncovered within the GodFather malware is its capability to steal gadget lock credentials, no matter whether or not the sufferer makes use of an unlock sample, a PIN, or a password. This poses a big risk to consumer privateness and gadget safety.”

The cellular safety firm stated the abuse of accessibility providers is likely one of the some ways malicious apps can obtain privilege escalation on Android, permitting them to acquire permissions that exceed their useful necessities. These embrace misuse of Authentic Gear Producer (OEM) permissions and safety vulnerabilities in pre-installed apps that can not be eliminated by customers.
“Stopping privilege escalation and securing Android ecosystems in opposition to malicious or over-privileged purposes requires greater than consumer consciousness or reactive patching—it calls for proactive, scalable, and clever protection mechanisms,” safety researcher Ziv Zeira stated.
SuperCard X Malware Involves Russia
The findings additionally observe the primary recorded makes an attempt to focus on Russian customers with SuperCard X, a newly emerged Android malware that may conduct near-field communication (NFC) relay assaults for fraudulent transactions.
In response to Russian cybersecurity firm F6, SuperCard X is a malicious modification of a respectable device known as NFCGate that may seize or modify NFC visitors. The tip aim of the malware is to not solely obtain NFC visitors from the sufferer, but in addition financial institution card information learn by sending instructions to its EMV chip.

“This utility permits attackers to steal financial institution card information by intercepting NFC visitors for subsequent theft of cash from customers’ financial institution accounts,” F6 researcher Alexander Koposov stated in a report revealed this week.
Assaults leveraging SuperCard X had been first noticed concentrating on Android customers in Italy earlier this yr, weaponizing NFC know-how to relay information from victims’ bodily playing cards to attacker-controlled units, from the place they had been used to hold out fraudulent ATM withdrawals or authorize point-of-sale (PoS) funds.
The Chinese language-speaking MaaS platform, marketed on Telegram as able to concentrating on clients of main banks within the U.S., Australia and Europe, shares substantial code-level overlaps with NGate, an Android malware that has additionally been discovered weaponizing NFCGate for malicious functions within the Czech Republic.

All these campaigns are united by the truth that they depend on smishing strategies to persuade a possible sufferer of the necessity to set up an APK file on the gadget beneath the guise of a helpful program.

Malicious Apps Noticed on App Shops
Whereas the entire aforementioned malware strains require victims to sideload the apps on their units, new analysis has additionally unearthed malicious apps on the official Google Play Retailer and Apple’s App Retailer with capabilities to reap private info and steal mnemonic phrases related to cryptocurrency wallets with the aim of draining their belongings.
One of many apps in query, RapiPlata, is estimated to have been downloaded round 150,000 instances on each Android and iOS units, underscoring the severity of the risk. The app is a kind of malware often called SpyLoan, which lures customers by claiming to supply loans at low-interest charges, solely to be subjected to extortion, blackmail, and information theft.
“RapiPlata primarily targets Colombian customers by promising fast loans,” Test Level stated. “Past its predatory lending practices, the app engages in intensive information theft. The app had intensive entry to delicate consumer information — together with SMS messages, name logs, calendar occasions, and put in purposes — even going as far as to add this information to its servers.”
The cryptocurrency pockets phishing apps, then again, have been distributed by way of compromised developer accounts and serve a phishing web page through WebView to acquire the seed phrases.
Though these apps have since been faraway from the respective app shops, the hazard is that the Android apps might be out there for obtain from third-party web sites. Customers are suggested to train warning when downloading monetary or loan-related purposes.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Android, Devices, Fraud, Hits, Malware, NFC, Overlays, Surge, Theft, Virtualization

Post navigation

Previous Post: Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War
Next Post: How to Detect Unusual Account Activity

Related Posts

New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims The Hacker News
Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group The Hacker News
Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto The Hacker News
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin The Hacker News
New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally The Hacker News
Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Detect Unusual Account Activity
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War
  • New Campaigns Distribute Malware via Open Source Hacking Tools
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • How to Detect Unusual Account Activity
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War
  • New Campaigns Distribute Malware via Open Source Hacking Tools
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News