Android trojan

Tech Optimizer
February 22, 2026
Security researchers have identified a new Android Trojan named PromptSpy that uses generative AI technology to enhance its persistence on compromised devices. Discovered by ESET researchers, PromptSpy leverages Google's Gemini AI model to analyze infected device screens and generate tailored instructions for embedding itself within recent apps lists. It includes a Virtual Network Computing (VNC) module that allows attackers full remote control over the device, enabling activities such as viewing the screen, performing actions remotely, capturing lock screen data, blocking uninstallation attempts, gathering device information, taking screenshots, and recording screen activity as video. The malware communicates with command-and-control servers using AES encryption and exploits Android Accessibility Services, making it difficult to remove. PromptSpy is distributed through a dedicated website and is financially motivated, adapting to various Android interfaces and operating system versions. ESET's analysis indicates that the malware is regionally targeted, with a focus on Argentina, and may have been developed in a Chinese-speaking environment. The same threat actor is believed to be responsible for both VNCSpy and PromptSpy.
AppWizard
February 19, 2026
Cybersecurity researchers have identified a new Android trojan named Massiv, designed for device takeover attacks targeting financial theft. It disguises itself as IPTV applications and poses risks to mobile banking users by allowing operators to remotely control infected devices for fraudulent transactions. The malware was first detected in campaigns targeting users in Portugal and Greece, with features including screen streaming, keylogging, SMS interception, and fake overlays for credential theft. One campaign specifically targeted the gov.pt application to deceive users into providing sensitive information. Massiv can execute various malicious actions, such as altering device settings, sending device information, and downloading malicious files. It is distributed through dropper applications that mimic IPTV services, often via SMS phishing. The malware operates in the background while the dropper appears as a legitimate app. Recent campaigns have focused on regions like Spain, Portugal, France, and Turkey, indicating a growing threat landscape. The operators of Massiv are developing it further, suggesting intentions to offer it as a Malware-as-a-Service.
AppWizard
October 2, 2025
Cybersecurity researchers from Cleafy have identified an Android trojan named Klopatra, which targets banking and cryptocurrency users by stealing funds from banking applications and cryptocurrency from hot wallets. This malware, attributed to a Turkish threat actor, has been active since March 2025 and has undergone 40 iterations. It is distributed through a deceptive app called Modpro IP TV + VPN, which requests Accessibility Services permissions upon installation. Klopatra employs advanced techniques to evade detection, including the use of Virbox for code protection, minimizing Java and Kotlin usage, NP Manager string encryption, and multiple anti-debugging features. Currently, at least 3,000 devices in Europe have been compromised by this malware.
Tech Optimizer
March 11, 2025
CTM360, a cybersecurity firm in Bahrain, has reported a new threat called the PlayPraetor trojan, which is distributed through malicious websites that imitate trusted sources like the Google Play Store. Users who visit these counterfeit sites may download an app disguised as a legitimate APK file, which requests extensive permissions, including access to accessibility services and SMS messages. Once installed, PlayPraetor functions as spyware, capturing keystrokes and clipboard activity, and specifically targets banking applications by scanning for them on infected devices. It sends a list of these apps to the attacker's server to steal banking credentials. The fraudulent links are often shared via Meta Ads and SMS messages, making it crucial for users to be cautious with links from these sources. The malicious sites closely resemble legitimate ones, so users should verify the website's spelling and URL. Deceptive advertisements and messages are commonly used to entice users into clicking links that lead to these sites. Users should be skeptical of anything that creates urgency or offers unrealistic deals. Excessive permission requests during app downloads should raise red flags, especially for unnecessary accessibility services. It is recommended to use reputable antivirus software for mobile protection, enable Google Play Protect, and avoid sideloading apps from unofficial sources to prevent potential threats.
Search