Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands

New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands

Posted on August 27, 2025August 27, 2025 By CWS

A classy new variant of the Hook Android banking trojan has emerged with unprecedented capabilities that place it among the many most superior cellular malware households noticed up to now.

This newest model, designated Hook Model 3, represents a big evolution in Android banking malware sophistication, introducing a complete arsenal of 107 distant instructions with 38 newly added functionalities that blur the normal boundaries between banking trojans, ransomware, and spy ware.

The malware’s distribution technique has expanded past typical phishing web sites to incorporate GitHub repositories, the place risk actors are actively leveraging the platform’s legitimacy to host and disseminate malicious APK information.

This method offers attackers with enhanced credibility and broader attain, as victims usually tend to belief functions hosted on respected platforms.

The GitHub distribution technique has additionally been noticed internet hosting different malware households together with Ermac and Brokewell, indicating a scientific method to malware-as-a-service operations.

Zimperium analysts recognized a number of groundbreaking capabilities that distinguish this variant from its predecessors, together with ransomware-style overlay assaults, fraudulent NFC interfaces, and complicated lock display bypass mechanisms.

Malware requesting accessibility companies to the sufferer (Supply – Zimperium)

The malware maintains its basis on Android Accessibility Companies abuse whereas introducing clear overlays for silent consumer gesture seize and real-time display streaming capabilities that present attackers with unprecedented gadget management.

Superior Overlay Assault Mechanisms

Hook Model 3’s most notable development lies in its subtle overlay assault system, which implements a number of deception layers to seize delicate consumer knowledge.

The ransomware-style overlay performance deploys full-screen warning messages demanding cryptocurrency funds, with pockets addresses and quantities dynamically retrieved from command-and-control servers.

Ransomware fashion overlay (Supply – Zimperium)

The embedded HTML content material throughout the APK allows rapid deployment when the “ransome” command is obtained, whereas the “delete_ransome” command permits distant dismissal.

The faux NFC overlay system demonstrates the malware’s evolving capabilities by way of the “takenfc” command, which creates misleading Close to Subject Communication scanning screens utilizing fullscreen WebView overlays.

Faux NFC overlay (Supply – Zimperium)

Though the present implementation lacks full JavaScript integration for knowledge exfiltration, its presence signifies ongoing growth towards complete NFC-based social engineering assaults.

Maybe most regarding is the lock display bypass mechanism, which mixes overlay methods with programmatic gadget unlocking.

The “unlock_pin” command sequence acquires WakeLock privileges, performs swipe-up gestures to disclose lock screens, and systematically inputs captured PINs by way of simulated button presses, successfully circumventing Android’s major safety barrier and granting attackers full gadget entry for subsequent malicious actions.

Increase your SOC and assist your crew defend your small business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Advanced, Android, Banking, Capabilities, Commands, HOOK, Malware, Remote, Supports

Post navigation

Previous Post: How to Understand Digital Certificates
Next Post: Securden Unified PAM Vulnerability Let Attackers Bypass Authentication

Related Posts

CISA Releases Guide to Protect Network Edge Devices From Hackers CISA Releases Guide to Protect Network Edge Devices From Hackers Cyber Security News
20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly 20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly Cyber Security News
Hacktivist Group Claimed Attacks Across 20+ Critical Sectors Following Iran–Israel Conflict Hacktivist Group Claimed Attacks Across 20+ Critical Sectors Following Iran–Israel Conflict Cyber Security News
Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data Cyber Security News
Sophisticated Skitnet Malware Actively Adopted by Ransomware Gangs to Streamline Operations Sophisticated Skitnet Malware Actively Adopted by Ransomware Gangs to Streamline Operations Cyber Security News
Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News