Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hugging Face Abused to Deploy Android RAT

Hugging Face Abused to Deploy Android RAT

Posted on January 30, 2026January 30, 2026 By CWS

The Hugging Face infrastructure has been abused for the supply of an Android distant entry trojan (RAT), Bitdefender reviews.

The assault chain begins with an advert or a immediate to obtain and set up a safety utility claiming to supply a number of helpful options.

The appliance, referred to as TrustBastion, acts as a dropper and instantly after launch prompts the person to fetch an replace, displaying legitimate-looking Google Play and Android system replace dialogs.

As soon as the person agrees, the dropper connects to an encrypted endpoint hosted at trustbastion[.]com, which serves an HTML web page that factors to a Hugging Face repository, after which downloads a malicious payload from the web platform’s datasets.

Based on Bitdefender, the Hugging Face repository used within the assault was roughly a month-old when taken offline and had over 6,000 commits. New payloads have been being generated roughly each quarter-hour, the cybersecurity agency says.

“The repository finally went offline, however just for the complete operation to maneuver to a different hyperlink, with the challenge utilizing completely different icons and a few minor changes. The code remained the identical,” Bitdefender explains.Commercial. Scroll to proceed studying.

After set up, the malicious payload requested broad permissions, pretending to be a safety function, and guided the person to allow Accessibility Providers to observe their actions.

It additionally requested permissions to report the display, carry out display casting, and show overlays, enabling it to look at, seize, and modify on-screen content material in actual time.

As soon as permissions are enabled, the malware can management contaminated gadgets and exfiltrate display content material to the command-and-control (C&C) server.

“The malware additionally shows fraudulent authentication interfaces designed to reap delicate credentials. It tries to impersonate widespread monetary and fee companies, together with Alipay and WeChat,” Bitdefender says.

Moreover, the malware may seize lock display data and authentication actions, and was seen sustaining persistent communication with the C&C and downloading webviews to imitate professional performance.

“This infrastructure is used to obtain instructions, transmit stolen information and ship up to date configuration data to contaminated gadgets. The identical infrastructure additionally facilitates payload redirection by serving Hugging Face obtain hyperlinks to the preliminary dropper,” Bitdefender says.

Quickly after the repository internet hosting TrustBastion disappeared on the finish of December, one other repository emerged, internet hosting Premium Membership, a seemingly completely different app that has the identical underlying code. Hugging Face took down the datasets serving the malware, Bitdefender says.

Associated: Kimwolf Android Botnet Grows Via Residential Proxy Networks

Associated: New $150 Cellik RAT Grants Android Management, Trojanizes Google Play Apps

Associated: New Albiriox Android Malware Developed by Russian Cybercriminals

Associated: Landfall Android Spy ware Focused Samsung Telephones by way of Zero-Day

Security Week News Tags:Abused, Android, Deploy, Face, Hugging, RAT

Post navigation

Previous Post: ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid
Next Post: GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details

Related Posts

Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Security Week News
Ox Security Bags M Series B to Tackle Appsec Alert Fatigue  Ox Security Bags $60M Series B to Tackle Appsec Alert Fatigue  Security Week News
F5 Blames Nation-State Hackers for Theft of Source Code and Vulnerability Data F5 Blames Nation-State Hackers for Theft of Source Code and Vulnerability Data Security Week News
Record-Breaking DDoS Attack Peaks at 22 Tbps and 10 Bpps Record-Breaking DDoS Attack Peaks at 22 Tbps and 10 Bpps Security Week News
Helmet Security Emerges From Stealth Mode With  Million in Funding Helmet Security Emerges From Stealth Mode With $9 Million in Funding Security Week News
How to Close the AI Governance Gap in Software Development How to Close the AI Governance Gap in Software Development Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News