unauthorized transactions

AppWizard
October 15, 2025
The GhostBat RAT campaign employs sophisticated malware distribution techniques, utilizing infection vectors such as WhatsApp, SMS with shortened URLs, GitHub-hosted APKs, and compromised websites to deliver malicious Android droppers. These droppers utilize multi-stage workflows, ZIP header manipulation, and string obfuscation to evade detection. The malware includes tools for stealing banking credentials and cryptocurrency miners, directing victims to phishing pages resembling the mParivahan app to collect sensitive information. SMS messages with banking keywords are exfiltrated to command and control servers, while incoming messages may be forwarded for OTP harvesting. Device registration occurs through a Telegram bot named GhostBatRat_bot. In July 2024, Android malware impersonating Regional Transport Office applications was documented, designed to steal contacts and SMS messages. Observations from September 2025 revealed over forty samples propagating through WhatsApp and SMS, ultimately delivering a malicious version of the mParivahan app. The malware initiates phishing activities by requesting SMS permissions and harvesting banking credentials. VirusTotal detections for the malware remain low due to its multi-layered dropper mechanisms and obfuscation techniques. The architecture of GhostBat RAT features multi-stage dropper workflows, native binary packing, and heavy string obfuscation. The first-stage dropper verifies device architecture and manufacturer, while subsequent stages decrypt and execute payloads, including a cryptominer library and a malicious APK for data theft. Victims encounter a counterfeit Google Play update page, leading to the installation of the malicious APK, which requests SMS permissions and presents a phishing interface. Users are prompted to enter their UPI PIN into a fake payment flow, which forwards the PIN to a Firebase endpoint. The campaign highlights the need for careful SMS permission management and vigilance against shortened URLs to combat emerging Android malware threats.
BetaBeacon
October 7, 2025
The vulnerability CVE-2025-59489 was identified by security researcher RyotaK in June, prompting companies like Valve and Microsoft to implement protective measures for users on platforms such as Steam and Xbox. The flaw had been dormant for nearly a decade, highlighting the challenges of maintaining legacy code. Concerns were raised about the vulnerability imperiling crypto wallets linked to mobile games, potentially allowing unauthorized transactions. Protective steps recommended include immediate engine upgrades and enhanced code audits. Unity's proactive patching sets a benchmark for rapid response, but questions remain about why the flaw persisted undetected for years. Ongoing vulnerability scanning and collaborative threat intelligence sharing are emphasized for future safeguards.
Search