Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Perseus Malware Targets Android Devices for Financial Fraud

Perseus Malware Targets Android Devices for Financial Fraud

Posted on March 19, 2026 By CWS

Cybersecurity experts have identified a new threat to Android devices known as the Perseus malware. This malicious software, actively circulating online, is designed to take over devices and commit financial fraud. Perseus builds on the foundations of earlier malware such as Cerberus and Phoenix, offering a more adaptable platform for compromising Android systems through dropper apps distributed via phishing websites.

Remote Monitoring and Regional Focus

Perseus utilizes accessibility-based remote sessions to monitor and interact with infected devices in real-time. This allows for complete control of the device, with a particular emphasis on targeting users in Turkey and Italy. According to ThreatFabric, the malware not only steals credentials but also monitors user notes to extract high-value personal or financial information.

The origin of Cerberus dates back to August 2019 when it was first documented by a Dutch mobile security firm. It was known for exploiting Android’s accessibility service to gain additional permissions and steal sensitive data. Following the release of Cerberus’s source code in 2020, several variants have emerged, including Alien, ERMAC, and Phoenix.

Technical Details and Distribution Tactics

The Perseus malware operates by embedding itself within applications masquerading as legitimate IPTV services. This tactic effectively lowers user suspicion and increases infection rates, as it blends malicious activities with a common distribution model. Reports indicate that Perseus has primarily targeted regions such as Turkey, Italy, Poland, Germany, France, the U.A.E., and Portugal.

Once installed, Perseus behaves like other Android banking malware, conducting overlay attacks and capturing keystrokes to intercept user input. It also displays fake interfaces over financial and cryptocurrency applications to steal user credentials. The malware supports several commands, including scanning notes from various apps, launching remote visual streams, and executing fake user interface interactions.

Advanced Malware Capabilities

Perseus is equipped with the capability to assess the device environment, checking for the presence of debuggers and analysis tools. It verifies SIM card insertion, evaluates the number of installed apps, and monitors battery values to ensure it operates on an actual device. This information is compiled into a suspicion score, sent to the command-and-control panel to guide further actions and potential data theft.

This malware exemplifies the ongoing evolution of Android threats. By combining established techniques from Cerberus and Phoenix with targeted improvements, Perseus highlights a trend towards more efficient and adaptable cyber threats. Its extensive capabilities underscore the need for increased vigilance and robust security measures to protect against evolving digital threats.

The Hacker News Tags:accessibility service, Android security, banking malware, Cerberus, Cybersecurity, financial fraud, mobile security, Perseus malware, Phoenix, ThreatFabric

Post navigation

Previous Post: Raven Secures $20M to Enhance Cloud Security Solutions
Next Post: From Young Hacker to CEO: The Journey of Ben Harris

Related Posts

Cybersecurity Updates: Qualcomm Flaw and iOS Exploit Chains Cybersecurity Updates: Qualcomm Flaw and iOS Exploit Chains The Hacker News
Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks The Hacker News
Enhancing Windows Security: Tackling MFA and Credential Risks Enhancing Windows Security: Tackling MFA and Credential Risks The Hacker News
GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms The Hacker News
New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control The Hacker News
Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Aura Reveals Data Breach Affecting 900,000 Users
  • Vibe-Coded Malware Campaign Exploits AI to Spread
  • From Young Hacker to CEO: The Journey of Ben Harris
  • Perseus Malware Targets Android Devices for Financial Fraud
  • Raven Secures $20M to Enhance Cloud Security Solutions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Aura Reveals Data Breach Affecting 900,000 Users
  • Vibe-Coded Malware Campaign Exploits AI to Spread
  • From Young Hacker to CEO: The Journey of Ben Harris
  • Perseus Malware Targets Android Devices for Financial Fraud
  • Raven Secures $20M to Enhance Cloud Security Solutions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark