Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads

New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads

Posted on December 6, 2025December 6, 2025 By CWS

A harmful new Android banking malware named FvncBot was first noticed on November 25, 2025. This malicious device is designed to steal delicate monetary data by logging keystrokes, recording screens, and injecting pretend login pages into banking apps.

The malware initially spreads by way of a pretend software disguised as a safety device for mBank, a preferred Polish financial institution.

The accessibility service of the payload software

The app, named “Klucz bezpieczeństwa mBank” (Safety Key mBank), acts as a “loader”. As soon as a person installs and opens this pretend app, it secretly downloads and installs the first FvncBot payload.

To cover its exercise, the malware makes use of a identified obfuscation service known as apk0day, making it more durable for safety methods to detect.

Bot debug messages

Researchers say FvncBot is totally different from different banking malware. As an alternative of reusing code from older threats like Ermac or Hook, its code appears to be like fully new.

FvncBot is very superior and consists of a number of highly effective options to defraud victims:

FeatureDescriptionKeyloggingAbuses Android Accessibility Companies to seize each keystroke, together with passwords, PINs, and OTPs. Logs as much as 1,000 occasions earlier than exfiltrating by way of HTTP or WebSocket.Internet-Inject AttacksDisplays pretend overlay home windows on reliable banking apps to trick customers into coming into credentials. Phishing pages obtained from command server.Display screen StreamingStreams machine display in real-time utilizing H.264 video compression for environment friendly bandwidth utilization and steady monitoring.HVNC (Hidden VNC)Allows distant machine management by creating JSON UI component representations. Permits attackers to navigate, swipe, click on, and enter information.Distant Command ExecutionUses WebSocket connection and Firebase Cloud Messaging (FCM) for near-real-time bidirectional communication with command servers.Machine ManipulationCapable of locking machine, muting audio, displaying black overlays, launching purposes, and coming into arbitrary information into textual content fields.Code ObfuscationObfuscated utilizing apk0day crypting service operated by GoldenCrypt actor to evade detection and safety evaluation.

They’ll swipe, click on, and even enter textual content to empty financial institution accounts whereas the telephone seems locked or blacked out.

The Intel471 discovery of FvncBot underscores the significance of downloading apps solely from official sources, such because the Google Play Retailer.

Log information collected from an overlay

Customers ought to be cautious of “safety updates” or banking apps discovered on third-party web sites or despatched by way of direct messages, as these are widespread traps used to ship such a malware.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Android, Attacking, Banking, FvncBot, Inject, Keystrokes, Log, Malicious, Payloads, Users

Post navigation

Previous Post: Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
Next Post: Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs

Related Posts

Critical Ivanti Endpoint Manager Vulnerabilities Let Attackers Execute Remote Code Critical Ivanti Endpoint Manager Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT Cyber Security News
Arkana Ransomware Claimed to Have Stolen 2.2 Million Customer Records Arkana Ransomware Claimed to Have Stolen 2.2 Million Customer Records Cyber Security News
New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices Cyber Security News
OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs Cyber Security News
MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark