Android trojan

AppWizard
February 19, 2026
Cybersecurity researchers have identified a new Android trojan named Massiv, designed for device takeover attacks targeting financial theft. It disguises itself as IPTV applications and poses risks to mobile banking users by allowing operators to remotely control infected devices for fraudulent transactions. The malware was first detected in campaigns targeting users in Portugal and Greece, with features including screen streaming, keylogging, SMS interception, and fake overlays for credential theft. One campaign specifically targeted the gov.pt application to deceive users into providing sensitive information. Massiv can execute various malicious actions, such as altering device settings, sending device information, and downloading malicious files. It is distributed through dropper applications that mimic IPTV services, often via SMS phishing. The malware operates in the background while the dropper appears as a legitimate app. Recent campaigns have focused on regions like Spain, Portugal, France, and Turkey, indicating a growing threat landscape. The operators of Massiv are developing it further, suggesting intentions to offer it as a Malware-as-a-Service.
AppWizard
October 2, 2025
Cybersecurity researchers from Cleafy have identified an Android trojan named Klopatra, which targets banking and cryptocurrency users by stealing funds from banking applications and cryptocurrency from hot wallets. This malware, attributed to a Turkish threat actor, has been active since March 2025 and has undergone 40 iterations. It is distributed through a deceptive app called Modpro IP TV + VPN, which requests Accessibility Services permissions upon installation. Klopatra employs advanced techniques to evade detection, including the use of Virbox for code protection, minimizing Java and Kotlin usage, NP Manager string encryption, and multiple anti-debugging features. Currently, at least 3,000 devices in Europe have been compromised by this malware.
Tech Optimizer
March 11, 2025
CTM360, a cybersecurity firm in Bahrain, has reported a new threat called the PlayPraetor trojan, which is distributed through malicious websites that imitate trusted sources like the Google Play Store. Users who visit these counterfeit sites may download an app disguised as a legitimate APK file, which requests extensive permissions, including access to accessibility services and SMS messages. Once installed, PlayPraetor functions as spyware, capturing keystrokes and clipboard activity, and specifically targets banking applications by scanning for them on infected devices. It sends a list of these apps to the attacker's server to steal banking credentials. The fraudulent links are often shared via Meta Ads and SMS messages, making it crucial for users to be cautious with links from these sources. The malicious sites closely resemble legitimate ones, so users should verify the website's spelling and URL. Deceptive advertisements and messages are commonly used to entice users into clicking links that lead to these sites. Users should be skeptical of anything that creates urgency or offers unrealistic deals. Excessive permission requests during app downloads should raise red flags, especially for unnecessary accessibility services. It is recommended to use reputable antivirus software for mobile protection, enable Google Play Protect, and avoid sideloading apps from unofficial sources to prevent potential threats.
Search