Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Android Malware Poses Threat to Mobile Banking Users

Android Malware Poses Threat to Mobile Banking Users

Posted on February 19, 2026 By CWS

Cybersecurity experts have identified a new Android malware, dubbed Massiv, which poses a significant threat to mobile banking users. According to ThreatFabric, this malware disguises itself as benign IPTV applications, targeting users interested in online TV services. Its primary objective is to execute device takeover (DTO) attacks for financial theft.

Malware Capabilities and Methods

Massiv is equipped with several features that aid in stealing user credentials. It employs screen streaming, keylogging, SMS interception, and deceptive overlays on banking apps to gather sensitive information. One particular campaign has been found targeting a Portuguese public administration application, tricking users into divulging their phone numbers and PIN codes to bypass Know Your Customer (KYC) processes.

The malware allows operators to control infected devices remotely, perform fraudulent transactions, and create new banking accounts under the victim’s name. It also uses Android’s accessibility services to operate stealthily, displaying a black screen overlay to hide its activities. Techniques similar to those used by other Android banking malware, such as Crocodilus and Klopatra, have been observed.

Technical Exploits and Distribution

The malware exploits Android’s features to capture screen content while circumventing protections against screen capture. It uses a UI-tree mode to process visible UI elements and export them to attackers, who can then interact with the device based on this information. Massiv enables actions such as muting device sounds, altering clipboard contents, and manipulating screen settings.

Massiv is distributed through SMS phishing campaigns, masquerading as IPTV apps. Once installed, it prompts users to allow software installation from external sources under the guise of an essential update. The dropper apps, such as IPTV24 and Google Play, facilitate the installation of the malware on the device.

Impact and Future Developments

Recent campaigns using TV-themed droppers have primarily affected users in Spain, Portugal, France, and Turkey. Although Massiv is not yet marketed as Malware-as-a-Service, its operators show signs of heading in that direction, with ongoing development and potential new features.

This development underscores the persistent demand for advanced malware solutions among cybercriminals. As Massiv continues to evolve, it is crucial for users to remain vigilant and for the cybersecurity community to enhance protective measures against such threats.

The Hacker News Tags:Android malware, banking trojan, credential theft, Cybersecurity, device takeover, IPTV apps, Massiv malware, mobile security, phishing attacks, ThreatFabric

Post navigation

Previous Post: Microsoft Defender Boosts Threat Response with New Script Library
Next Post: OpenClaw Faces Ongoing Security Challenges with New Open Source Tool

Related Posts

Malicious NuGet Package Targets Financial Sector Malicious NuGet Package Targets Financial Sector The Hacker News
Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild The Hacker News
Phishing Campaign Impersonates CERT-UA to Spread Malware Phishing Campaign Impersonates CERT-UA to Spread Malware The Hacker News
Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability The Hacker News
Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More The Hacker News
How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Exploit Drift in $285 Million Crypto Heist
  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Exploit Drift in $285 Million Crypto Heist
  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark