A new strain of Android malware, identified as Android.Backdoor.916.origin, is being distributed through an app called GuardCB, which poses as a security application. The app, with a Russian interface and a logo resembling that of the Central Bank of Russia, requests extensive permissions, including device location, microphone and camera access, messages and call logs, contacts, and administrator rights. It also seeks access to popular applications like WhatsApp, Telegram, Chrome, Gmail, and Yandex. The malware enables hackers to stream live video and audio, capture images, access stored files, monitor keystrokes, and track communications and geolocation in real time. The app conducts simulated antivirus scans and generates fake threat results to reassure users while compromising their security. There are no confirmed links to specific actors or espionage activities, but the malware's extensive permissions and targeted nature raise concerns about potential state involvement amidst escalating cyber conflicts in the region.