accessibility services

AppWizard
December 2, 2025
A new Android malware named Albiriox has emerged, marketed as malware-as-a-service (MaaS). It features a hard-coded list of over 400 applications, including banking and cryptocurrency platforms, and is distributed through social engineering tactics using dropper applications. Initially advertised in late September 2025, it became a full MaaS offering by October, with Russian-speaking threat actors behind its development. Albiriox allows remote control of compromised devices via an unencrypted TCP socket connection and Virtual Network Computing (VNC), enabling attackers to extract sensitive information and perform overlay attacks for credential theft. One campaign targeted victims in Austria using German-language lures and counterfeit Google Play Store listings. Albiriox also utilizes Android's accessibility services to bypass security measures and employs a novel distribution strategy involving a counterfeit website that collects phone numbers. Additionally, another Android MaaS tool, RadzaRat, was introduced, masquerading as a file management utility while offering extensive surveillance and remote control capabilities. RadzaRat can log keystrokes and maintain persistence through specific permissions, highlighting a trend in the availability of sophisticated cybercrime tools.
AppWizard
November 5, 2025
Security researchers from ESET discovered that 12 malicious Android chat applications, including Privee Talk, MeetMe, Let’s Chat, Quick Chat, Rafaqat رفاق, and Chit Chat, were found to covertly harvest users’ messages and deploy a remote access trojan called VajraSpy. Six of these apps were available on Google Play before being flagged for suspicious activity, resulting in approximately 1,400 downloads, primarily targeting users in India and Pakistan. The spyware could extract messages from encrypted chat platforms, record ambient sounds in real time, and intercept communications on apps like WhatsApp and Signal. The operators used honey-trap tactics to entice users into installing the apps, which requested permissions typical of espionage tools, such as RECORD_AUDIO and access to notifications and accessibility services. Users are advised to uninstall these apps and review permissions to protect against potential threats.
AppWizard
October 27, 2025
Stellarium is an advanced stargazing app that provides a detailed celestial map and visibility planning features for optimal viewing times of celestial bodies. Fooview enhances multitasking with a customizable floating command interface, allowing quick gestures for various actions without interrupting current apps. Ampere displays charging metrics, helping users evaluate charger and device performance, and offers a cool-down feature for older battery packs. Each app has specific requirements, such as permissions for Fooview's overlays and approximate measurements for Ampere's data.
AppWizard
October 10, 2025
Cybersecurity researchers have identified a dangerous Android malware disguised as the Mobdro Pro IP TV + VPN app, which has already affected over 3,000 devices in Europe. The malware, known as Klopatra, gains remote control of infected devices by exploiting Android Accessibility Services, allowing cybercriminals to access users' bank accounts. The app prompts users to grant permissions that facilitate the attack, and it is suspected to originate from a Turkish-speaking group. Cleafy estimates around 1,000 individuals have been affected, raising concerns that other criminal organizations may replicate this scheme, complicating detection efforts.
AppWizard
October 2, 2025
Cybersecurity researchers from Cleafy have identified an Android trojan named Klopatra, which targets banking and cryptocurrency users by stealing funds from banking applications and cryptocurrency from hot wallets. This malware, attributed to a Turkish threat actor, has been active since March 2025 and has undergone 40 iterations. It is distributed through a deceptive app called Modpro IP TV + VPN, which requests Accessibility Services permissions upon installation. Klopatra employs advanced techniques to evade detection, including the use of Virbox for code protection, minimizing Java and Kotlin usage, NP Manager string encryption, and multiple anti-debugging features. Currently, at least 3,000 devices in Europe have been compromised by this malware.
Search