Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Android Malware Poses Threat to Mobile Banking Users

Android Malware Poses Threat to Mobile Banking Users

Posted on February 19, 2026 By CWS

Cybersecurity experts have identified a new Android malware, dubbed Massiv, which poses a significant threat to mobile banking users. According to ThreatFabric, this malware disguises itself as benign IPTV applications, targeting users interested in online TV services. Its primary objective is to execute device takeover (DTO) attacks for financial theft.

Malware Capabilities and Methods

Massiv is equipped with several features that aid in stealing user credentials. It employs screen streaming, keylogging, SMS interception, and deceptive overlays on banking apps to gather sensitive information. One particular campaign has been found targeting a Portuguese public administration application, tricking users into divulging their phone numbers and PIN codes to bypass Know Your Customer (KYC) processes.

The malware allows operators to control infected devices remotely, perform fraudulent transactions, and create new banking accounts under the victim’s name. It also uses Android’s accessibility services to operate stealthily, displaying a black screen overlay to hide its activities. Techniques similar to those used by other Android banking malware, such as Crocodilus and Klopatra, have been observed.

Technical Exploits and Distribution

The malware exploits Android’s features to capture screen content while circumventing protections against screen capture. It uses a UI-tree mode to process visible UI elements and export them to attackers, who can then interact with the device based on this information. Massiv enables actions such as muting device sounds, altering clipboard contents, and manipulating screen settings.

Massiv is distributed through SMS phishing campaigns, masquerading as IPTV apps. Once installed, it prompts users to allow software installation from external sources under the guise of an essential update. The dropper apps, such as IPTV24 and Google Play, facilitate the installation of the malware on the device.

Impact and Future Developments

Recent campaigns using TV-themed droppers have primarily affected users in Spain, Portugal, France, and Turkey. Although Massiv is not yet marketed as Malware-as-a-Service, its operators show signs of heading in that direction, with ongoing development and potential new features.

This development underscores the persistent demand for advanced malware solutions among cybercriminals. As Massiv continues to evolve, it is crucial for users to remain vigilant and for the cybersecurity community to enhance protective measures against such threats.

The Hacker News Tags:Android malware, banking trojan, credential theft, Cybersecurity, device takeover, IPTV apps, Massiv malware, mobile security, phishing attacks, ThreatFabric

Post navigation

Previous Post: Microsoft Defender Boosts Threat Response with New Script Library
Next Post: OpenClaw Faces Ongoing Security Challenges with New Open Source Tool

Related Posts

Why Runtime Visibility Must Take Center Stage Why Runtime Visibility Must Take Center Stage The Hacker News
Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign The Hacker News
Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero The Hacker News
Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics The Hacker News
Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack The Hacker News
AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in API Keys Plugin Enables Account Takeovers
  • OpenClaw Faces Ongoing Security Challenges with New Open Source Tool
  • Android Malware Poses Threat to Mobile Banking Users
  • Microsoft Defender Boosts Threat Response with New Script Library
  • Crypto Mining Malware Targets Air-Gapped Systems via USB

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in API Keys Plugin Enables Account Takeovers
  • OpenClaw Faces Ongoing Security Challenges with New Open Source Tool
  • Android Malware Poses Threat to Mobile Banking Users
  • Microsoft Defender Boosts Threat Response with New Script Library
  • Crypto Mining Malware Targets Air-Gapped Systems via USB

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News