Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Attackers Using Hugging Face Hosting to Deliver Android RAT Payload

Attackers Using Hugging Face Hosting to Deliver Android RAT Payload

Posted on January 30, 2026January 30, 2026 By CWS

A brand new Android menace marketing campaign has emerged that makes use of social engineering mixed with a reliable machine studying platform to unfold harmful malware throughout gadgets.

The assault begins when customers see pretend safety alerts claiming their telephones are contaminated and wish safety. These misleading prompts push customers to obtain a pretend safety app known as TrustBastion, which initially seems innocent.

Nonetheless, as soon as put in, this app turns into the place to begin for a posh an infection chain that may give attackers full management over compromised Android gadgets.

The marketing campaign exploits Hugging Face, a well-liked platform utilized by builders and researchers to share machine studying fashions and datasets.

As an alternative of counting on suspicious domains that might be blocked, attackers abuse this trusted service to host and ship their malicious payloads.

Automated payload era (Supply – Bitdefender)

This method is especially harmful as a result of Hugging Face is well known as a reliable platform, making safety instruments much less more likely to flag site visitors coming from it. The platform claims all uploads are scanned, however the assault exhibits gaps in present safety measures.

After set up, TrustBastion shows a pretend replace notification that carefully mimics reliable Google Play or Android system dialogs.

Bitdefender researchers recognized that when customers click on to replace, the app connects to a server that redirects them to a Hugging Face repository internet hosting the precise malicious Android utility.

This two-stage supply course of helps attackers keep away from speedy detection and will increase the success fee of infections.

How Attackers Preserve Management and Steal Knowledge

As soon as the malicious payload installs, it requests important permissions whereas pretending to be a reliable cellphone safety characteristic.

Second-stage payload conduct (Supply – Bitdefender)

A very powerful permission is Accessibility Companies, which provides the malware in depth visibility into every little thing customers do on their gadgets.

With this entry, the RAT can monitor consumer exercise, seize screenshots, document screens, and show pretend login screens designed to steal monetary credentials from companies like Alipay and WeChat.

The malware additionally captures lock display info and maintains fixed communication with a distant command server utilizing persistent connections.

Surveillance and credential theft (Supply – Bitdefender)

This connection permits attackers to transmit stolen knowledge and obtain new instructions in actual time. Researchers found that attackers regenerate new variations of the malware roughly each fifteen minutes by server-side polymorphism.

Over twenty-nine days, the unique repository amassed greater than six thousand commits.

Every new model introduces minor variations whereas sustaining an identical malicious performance, a way particularly designed to evade safety detection methods based mostly on file hashes.

When the unique TrustBastion repository disappeared in December 2025, attackers merely relaunched with a special app title known as Premium Membership, utilizing the identical underlying code to proceed their marketing campaign and keep away from extended detection.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Android, Attackers, Deliver, Face, Hosting, Hugging, Payload, RAT

Post navigation

Previous Post: China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
Next Post: White House Scraps ‘Burdensome’ Software Security Rules 

Related Posts

Alleged Ransomware Attack on Apple’s Second-Largest Manufacturer Luxshare Alleged Ransomware Attack on Apple’s Second-Largest Manufacturer Luxshare Cyber Security News
Windows Graphics Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code Windows Graphics Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code Cyber Security News
U.S. DOJ Charged 54 in Connection With ATM Hacking Attack by Deploying Ploutus Malware U.S. DOJ Charged 54 in Connection With ATM Hacking Attack by Deploying Ploutus Malware Cyber Security News
Critical Vulnerability in Python PLY Library Enables Remote Code Execution Critical Vulnerability in Python PLY Library Enables Remote Code Execution Cyber Security News
New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ Hosts New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ Hosts Cyber Security News
Diesel Vortex Targets Logistics Sector, Steals Credentials Diesel Vortex Targets Logistics Sector, Steals Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark