Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands

New Hook Android Banking Malware With New Advanced Capabilities and Supports 107 Remote Commands

Posted on August 27, 2025August 27, 2025 By CWS

A classy new variant of the Hook Android banking trojan has emerged with unprecedented capabilities that place it among the many most superior cellular malware households noticed up to now.

This newest model, designated Hook Model 3, represents a big evolution in Android banking malware sophistication, introducing a complete arsenal of 107 distant instructions with 38 newly added functionalities that blur the normal boundaries between banking trojans, ransomware, and spy ware.

The malware’s distribution technique has expanded past typical phishing web sites to incorporate GitHub repositories, the place risk actors are actively leveraging the platform’s legitimacy to host and disseminate malicious APK information.

This method offers attackers with enhanced credibility and broader attain, as victims usually tend to belief functions hosted on respected platforms.

The GitHub distribution technique has additionally been noticed internet hosting different malware households together with Ermac and Brokewell, indicating a scientific method to malware-as-a-service operations.

Zimperium analysts recognized a number of groundbreaking capabilities that distinguish this variant from its predecessors, together with ransomware-style overlay assaults, fraudulent NFC interfaces, and complicated lock display bypass mechanisms.

Malware requesting accessibility companies to the sufferer (Supply – Zimperium)

The malware maintains its basis on Android Accessibility Companies abuse whereas introducing clear overlays for silent consumer gesture seize and real-time display streaming capabilities that present attackers with unprecedented gadget management.

Superior Overlay Assault Mechanisms

Hook Model 3’s most notable development lies in its subtle overlay assault system, which implements a number of deception layers to seize delicate consumer knowledge.

The ransomware-style overlay performance deploys full-screen warning messages demanding cryptocurrency funds, with pockets addresses and quantities dynamically retrieved from command-and-control servers.

Ransomware fashion overlay (Supply – Zimperium)

The embedded HTML content material throughout the APK allows rapid deployment when the “ransome” command is obtained, whereas the “delete_ransome” command permits distant dismissal.

The faux NFC overlay system demonstrates the malware’s evolving capabilities by way of the “takenfc” command, which creates misleading Close to Subject Communication scanning screens utilizing fullscreen WebView overlays.

Faux NFC overlay (Supply – Zimperium)

Though the present implementation lacks full JavaScript integration for knowledge exfiltration, its presence signifies ongoing growth towards complete NFC-based social engineering assaults.

Maybe most regarding is the lock display bypass mechanism, which mixes overlay methods with programmatic gadget unlocking.

The “unlock_pin” command sequence acquires WakeLock privileges, performs swipe-up gestures to disclose lock screens, and systematically inputs captured PINs by way of simulated button presses, successfully circumventing Android’s major safety barrier and granting attackers full gadget entry for subsequent malicious actions.

Increase your SOC and assist your crew defend your small business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Advanced, Android, Banking, Capabilities, Commands, HOOK, Malware, Remote, Supports

Post navigation

Previous Post: How to Understand Digital Certificates
Next Post: Securden Unified PAM Vulnerability Let Attackers Bypass Authentication

Related Posts

Starbucks Faces Cyber Breach: 10GB Data Allegedly Stolen Starbucks Faces Cyber Breach: 10GB Data Allegedly Stolen Cyber Security News
AI Uncovers Critical RCE Flaws in Vim and Emacs AI Uncovers Critical RCE Flaws in Vim and Emacs Cyber Security News
Threat Actors Exploiting Black Friday Shopping Hype Threat Actors Exploiting Black Friday Shopping Hype Cyber Security News
LofyStealer Targets Minecraft Players with Advanced Tactics LofyStealer Targets Minecraft Players with Advanced Tactics Cyber Security News
Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Cyber Security News
Threat Actors Advertising AI-Enhanced Metamorphic Crypter with Claims of Windows Defender Bypass Threat Actors Advertising AI-Enhanced Metamorphic Crypter with Claims of Windows Defender Bypass Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark