Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps

Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps

Posted on September 25, 2025September 25, 2025 By CWS

A complicated cybercriminal marketing campaign has emerged concentrating on Indonesian and Vietnamese Android customers with banking trojans disguised as legit authorities identification functions and cost providers.

The malicious operation, energetic since roughly August 2024, employs superior evasion methods to ship variants of the BankBot trojan household whereas sustaining an in depth infrastructure of over 100 domains.

The menace actors reveal vital operational sophistication by means of their use of faux Google Play Retailer pages and authorities service functions similar to M-Pajak tax cost providers and digital identification verification techniques.

The marketing campaign exploits consumer belief in official authorities platforms, creating extremely convincing replicas that deceive victims into downloading malicious APK recordsdata containing banking trojans able to stealing delicate monetary info and credentials.

DomainTools analysts recognized the malware distribution sample by means of monitoring suspicious web site parts related to spoofed Google Play Retailer web sites.

The researchers uncovered an elaborate supply mechanism designed to bypass conventional community safety controls and evade automated detection techniques generally employed by cybersecurity frameworks.

Superior WebSocket-Based mostly Supply Mechanism

The menace actors make use of a remarkably refined malware supply system that leverages WebSocket know-how to bypass standard safety measures.

Relatively than offering direct obtain hyperlinks that safety scanners can simply detect, the malicious websites make the most of the Socket.IO library to determine real-time bidirectional communication channels between sufferer browsers and command servers.

Pretend verification apps (Supply -Domaintools)

When customers click on the Android obtain button, the system initiates a WebSocket connection utilizing the command socket. Emit(‘startDownload’, …).

The server responds by transmitting the malicious APK file in fragmented chunks somewhat than as a whole file switch.

The browser collects these fragments by means of occasion listeners coded as socket. On(‘chunk’, (chunk) => { chunks. Push(chunk); });, whereas concurrently receiving progress updates that keep the phantasm of a legit obtain course of.

Upon completion, the system combines all acquired chunks in reminiscence and assigns the MIME kind software/vnd.android.package-archive to create a correct APK file construction.

The supply mechanism then generates a short lived native URL and programmatically triggers an invisible obtain hyperlink, prompting the browser’s customary file obtain interface.

This elaborate course of successfully disguises malware distribution as encrypted WebSocket visitors, permitting malicious payloads to bypass community safety techniques configured to dam direct APK downloads whereas remaining invisible to static URL-based safety scanners that crawl web sites for malicious hyperlinks.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Android, Apps, Attacking, Banking, Government, Legitimate, Mimic, Payment, Trojans, Users

Post navigation

Previous Post: Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts
Next Post: BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features

Related Posts

Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures Cyber Security News
Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer Cyber Security News
Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams Cyber Security News
Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life Cyber Security News
Parrot 7.0 Released with New Penetration Testing and AI Tools Parrot 7.0 Released with New Penetration Testing and AI Tools Cyber Security News
Auditing Data Access Controls for Privacy Regulation Adherence Auditing Data Access Controls for Privacy Regulation Adherence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News