Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FvncBot Exploits Android Accessibility: A New Threat

FvncBot Exploits Android Accessibility: A New Threat

Posted on February 6, 2026 By CWS

A newly discovered malware, FvncBot, is posing a significant threat to Android users, particularly targeting those involved with mobile banking in Poland. Identified on November 25, 2025, this malicious software impersonates a legitimate security application from mBank, one of Poland’s leading financial institutions.

Deceptive Tactics and Installation

The FvncBot malware deceives users by presenting itself as a credible banking tool, tricking them into installing the application. Once installed, it silently operates in the background, aiming to compromise financial accounts through advanced surveillance tactics.

The infection process involves a deceptive prompt urging users to install an additional “Play” component, claimed to be essential for maintaining system stability. This strategy is crucial to bypass Android’s security measures, allowing the malware to gain a persistent presence on the device.

Innovative and Invasive Capabilities

Intel 471’s research revealed that FvncBot is an entirely original creation, not derived from any known banking trojan codes. This suggests a new group of developers behind its development. The malware employs invasive methods to steal funds by logging keystrokes and capturing screen data.

One of its alarming features is the use of hidden virtual network computing, enabling attackers to remotely control the infected device. This capability allows cybercriminals to conduct fraudulent transactions without the victim’s knowledge.

Exploiting Accessibility Services

FvncBot’s most concerning tactic is its exploitation of Android’s accessibility services to maintain control over the device. After installation, it persistently requests elevated privileges, guiding users to grant these permissions in system settings. Once granted, the malware can read on-screen text and monitor user interactions.

With these permissions, FvncBot can extract data from any open application, including secure banking interfaces, and transmit this information to a remote server. The malware also uses WebSockets to establish a rapid connection, allowing operators to issue commands and manipulate the device in real-time.

To mitigate such threats, users are advised to download banking applications solely from official sources and avoid unverified websites. Staying informed about such cyber threats is crucial for maintaining device security.

Cyber Security News Tags:accessibility services, Android security, banking trojan, cyber threat, Cybersecurity, FvncBot, Intel471, Malware, mBank, mobile banking

Post navigation

Previous Post: Transparent Tribe Targets India’s Tech Startups
Next Post: Claude Opus 4.6 Unveils 500+ Critical Vulnerabilities

Related Posts

Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10 Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10 Cyber Security News
175,000 Exposed Ollama Hosts Enable Code Execution and External System Access 175,000 Exposed Ollama Hosts Enable Code Execution and External System Access Cyber Security News
28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild 28,000+ Citrix Servers Exposed to Active 0-Day RCE Vulnerability Exploited in the Wild Cyber Security News
MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command MacSync macOS Infostealer Leverage ClickFix-style Attack to Trick Users Pasting a Single Terminal Command Cyber Security News
Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Cyber Security News
Adobe’s August 2025 Patch Tuesday Adobe’s August 2025 Patch Tuesday Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News