Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps

Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps

Posted on September 25, 2025September 25, 2025 By CWS

A complicated cybercriminal marketing campaign has emerged concentrating on Indonesian and Vietnamese Android customers with banking trojans disguised as legit authorities identification functions and cost providers.

The malicious operation, energetic since roughly August 2024, employs superior evasion methods to ship variants of the BankBot trojan household whereas sustaining an in depth infrastructure of over 100 domains.

The menace actors reveal vital operational sophistication by means of their use of faux Google Play Retailer pages and authorities service functions similar to M-Pajak tax cost providers and digital identification verification techniques.

The marketing campaign exploits consumer belief in official authorities platforms, creating extremely convincing replicas that deceive victims into downloading malicious APK recordsdata containing banking trojans able to stealing delicate monetary info and credentials.

DomainTools analysts recognized the malware distribution sample by means of monitoring suspicious web site parts related to spoofed Google Play Retailer web sites.

The researchers uncovered an elaborate supply mechanism designed to bypass conventional community safety controls and evade automated detection techniques generally employed by cybersecurity frameworks.

Superior WebSocket-Based mostly Supply Mechanism

The menace actors make use of a remarkably refined malware supply system that leverages WebSocket know-how to bypass standard safety measures.

Relatively than offering direct obtain hyperlinks that safety scanners can simply detect, the malicious websites make the most of the Socket.IO library to determine real-time bidirectional communication channels between sufferer browsers and command servers.

Pretend verification apps (Supply -Domaintools)

When customers click on the Android obtain button, the system initiates a WebSocket connection utilizing the command socket. Emit(‘startDownload’, …).

The server responds by transmitting the malicious APK file in fragmented chunks somewhat than as a whole file switch.

The browser collects these fragments by means of occasion listeners coded as socket. On(‘chunk’, (chunk) => { chunks. Push(chunk); });, whereas concurrently receiving progress updates that keep the phantasm of a legit obtain course of.

Upon completion, the system combines all acquired chunks in reminiscence and assigns the MIME kind software/vnd.android.package-archive to create a correct APK file construction.

The supply mechanism then generates a short lived native URL and programmatically triggers an invisible obtain hyperlink, prompting the browser’s customary file obtain interface.

This elaborate course of successfully disguises malware distribution as encrypted WebSocket visitors, permitting malicious payloads to bypass community safety techniques configured to dam direct APK downloads whereas remaining invisible to static URL-based safety scanners that crawl web sites for malicious hyperlinks.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Android, Apps, Attacking, Banking, Government, Legitimate, Mimic, Payment, Trojans, Users

Post navigation

Previous Post: Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts
Next Post: BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features

Related Posts

Microsoft Teams to Allow Users Adding Agents and Bots With Their Current Conversation Microsoft Teams to Allow Users Adding Agents and Bots With Their Current Conversation Cyber Security News
Škoda Online Shop Data Breach Exposes Customer Information Škoda Online Shop Data Breach Exposes Customer Information Cyber Security News
Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide Microsoft DNS Outage Disrupts Azure and Microsoft 365 Services Worldwide Cyber Security News
Microsoft Defender Expands Security to Teams with URL Alerts Microsoft Defender Expands Security to Teams with URL Alerts Cyber Security News
New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards Cyber Security News
Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark