<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Android malware &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/malware/android-malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Sat, 21 Feb 2026 05:40:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Android malware &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>PromptSpy: Android Malware Uses Google Gemini AI</title>
		<link>https://firsthackersnews.com/promptspy/</link>
					<comments>https://firsthackersnews.com/promptspy/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 05:54:19 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AccessibilityAbuse]]></category>
		<category><![CDATA[#AISecurity]]></category>
		<category><![CDATA[#AndroidMalware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#AppSecurity]]></category>
		<category><![CDATA[#BankingTrojan]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DigitalForensics]]></category>
		<category><![CDATA[#EmergingThreats]]></category>
		<category><![CDATA[#GeminiAI]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#MobileThreats]]></category>
		<category><![CDATA[#PhishingCampaign]]></category>
		<category><![CDATA[#PlayProtect]]></category>
		<category><![CDATA[#PromptSpy]]></category>
		<category><![CDATA[#RAT]]></category>
		<category><![CDATA[#RemoteAccessTrojan]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#VNC]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11210</guid>

					<description><![CDATA[<p>PromptSpy is a newly discovered Android malware family that uses Google’s Gemini AI model to make real-time decisions</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/promptspy/">PromptSpy: Android Malware Uses Google Gemini AI</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>PromptSpy is a newly discovered Android malware family that uses Google’s Gemini AI model to make real-time decisions on infected devices.</p>



<p>Instead of using fixed screen coordinates or simple automation rules, PromptSpy sends Gemini a natural-language request along with an XML snapshot of the current screen. This snapshot includes details about visible elements such as text, type, and screen position.</p>



<p>Gemini analyzes the screen content and responds with JSON instructions telling the malware what action to perform — such as tap, long-press, or swipe — and exactly where to do it.</p>



<p>The main goal is persistence. PromptSpy uses this AI-driven method to keep its malicious app pinned in the Recent Apps list, even when the user tries to close it.</p>



<p>The malware runs in a loop. It executes Gemini’s instructions using Android’s Accessibility Service, captures the updated screen, and sends it back to Gemini. This continues until the AI confirms the app is successfully pinned. Because it relies on AI analysis instead of hardcoded rules, it works across different devices, Android versions, and manufacturer customizations.</p>



<p>Security researchers at ESET describe PromptSpy as the first known Android malware to directly integrate generative AI into its execution flow. The focus is stealthy persistence and maintaining control over the device.</p>



<h3 class="wp-block-heading">Android AI Malware Capabilities</h3>



<p>Beyond AI-based persistence, PromptSpy also acts as a powerful remote access tool.</p>



<p>It includes a built-in VNC component that allows attackers to control the infected phone in real time. Once the victim grants Accessibility permissions, attackers can:</p>



<ul class="wp-block-list">
<li>View the device screen live</li>



<li>Simulate taps and gestures</li>



<li>Perform actions as if physically holding the phone</li>
</ul>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="1024" height="768" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-3.png" alt="" class="wp-image-11211" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-200x150.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-300x225.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-400x300.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-600x450.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-768x576.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-800x600.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3.png 1024w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Android/Phishing.Agent.M UI showing the same fake site as the PromptSpy dropper (Source: ESET).</figcaption></figure>



<p>The malware can capture lockscreen credentials, gather device information, take screenshots, record screen activity as video, and monitor which app is currently in use.</p>



<p>It communicates with a hardcoded command-and-control server using the VNC protocol, protected by AES encryption. The server can also send a Gemini API key and additional task instructions to the malware.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="968" height="1024" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-968x1024.png" alt="" class="wp-image-11212" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-200x212.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-284x300.png 284w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-400x423.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-600x635.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-768x813.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-800x846.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-968x1024.png 968w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-1200x1270.png 1200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-1452x1536.png 1452w" sizes="(max-width: 968px) 100vw, 968px" /><figcaption class="wp-element-caption">Malware screen prompting installation of the PromptSpy payload (Source: ESET).<br></figcaption></figure>



<p>PromptSpy also actively blocks removal attempts. It abuses Accessibility permissions to place invisible overlays on important system buttons, including those used to uninstall the app or disable its privileges.</p>



<p>These transparent overlays intercept user taps on “Uninstall” or “Stop,” preventing normal removal.</p>



<p>Technical analysis shows that PromptSpy is delivered through a dropper app. The malicious payload (app-release.apk) is embedded inside the dropper’s assets directory.</p>



<h2 class="wp-block-heading"><strong>Campaign Spread and Target Regions</strong></h2>



<p>ESET connects PromptSpy to a multi-stage, financially driven campaign mainly targeting users in Argentina.</p>



<p>An earlier variant, VNCSpy, was uploaded from Hong Kong in January 2026. More advanced PromptSpy samples appeared from Argentina in February 2026.</p>



<p>The malware spread through domains such as mgardownload[.]com and m-mgarg[.]com, which imitated JPMorgan Chase branding under the name “MorganArg” using Spanish banking lures.</p>



<p>Analysis of the same infrastructure revealed another Android phishing trojan signed with the same certificate and using the same fake banking site, likely acting as the initial infection stage before deploying PromptSpy.</p>



<p>Although PromptSpy has not appeared widely in ESET telemetry and may still be in limited testing, the active domains confirm some real-world use.</p>



<p>Code findings, including simplified Chinese debug strings and references to Chinese Accessibility events, suggest development in a Chinese-speaking environment, even though current targets are in Latin America.</p>



<p>PromptSpy is not available on Google Play, and Google Play Protect now detects known variants.</p>



<p>This campaign follows ESET’s 2025 discovery of PromptLock, an AI-powered ransomware prototype, highlighting the growing use of generative AI in malware operations.</p>



<h2 class="wp-block-heading" id="h-iocs"><strong>IOCs</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th><strong>SHA-1</strong></th><th><strong>Filename</strong></th><th><strong>Detection</strong></th><th><strong>Description</strong></th></tr></thead><tbody><tr><td>6BBC9AB132BA066F63676E05DA13D108598BC29B</td><td>net.ustexas.myavlive.apk</td><td>Android/Spy.VNCSpy.A</td><td>Android VNCSpy malware.</td></tr><tr><td>375D7423E63C8F5F2CC814E8CFE697BA25168AFA</td><td>nlll4.un7o6.q38l5.apk</td><td>Android/Spy.VNCSpy.A</td><td>Android VNCSpy malware.</td></tr><tr><td>3978AC5CD14E357320E127D6C87F10CB70A1DCC2</td><td>ppyzz.dpk0p.ln441.apk</td><td>Android/Spy.VNCSpy.A</td><td>Android VNCSpy malware.</td></tr><tr><td>E60D12017D2DA579DF87368F5596A0244621AE86</td><td>mgappc-1.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>9B1723284E311794987997CB7E8814EB6014713F</td><td>mgappm-1.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>076801BD9C6EB78FC0331A4C7A22C73199CC3824</td><td>mgappn-0.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>8364730E9BB2CF3A4B016DE1B34F38341C0EE2FA</td><td>mgappn-1.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>F8F4C5BC498BCCE907DC975DD88BE8D594629909</td><td>app-release.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy.</td></tr><tr><td>C14E9B062ED28115EDE096788F62B47A6ED841AC</td><td>mgapp.apk</td><td>Android/Phishing.Agent.M</td><td>Android phishing malware.</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/promptspy/">PromptSpy: Android Malware Uses Google Gemini AI</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/promptspy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Android Volume Button Bug Tied to Select to Speak Feature</title>
		<link>https://firsthackersnews.com/volume-button/</link>
					<comments>https://firsthackersnews.com/volume-button/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 19 Jan 2026 05:56:31 +0000</pubDate>
				<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[Android bug]]></category>
		<category><![CDATA[mobile security]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11003</guid>

					<description><![CDATA[<p>Google has confirmed an Android bug that affects how volume buttons behave when the Select to Speak accessibility</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/volume-button/">Android Volume Button Bug Tied to Select to Speak Feature</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Google has confirmed an Android bug that affects how <strong>volume buttons behave when the Select to Speak accessibility feature is enabled</strong>. The issue interferes with everyday actions like adjusting media volume and taking photos, creating a frustrating experience for affected users.</p>



<p>Reports suggest the problem is widespread and impacts devices using the Android Accessibility Suite.</p>



<h2 class="wp-block-heading"><strong>What’s Going Wrong</strong></h2>



<p>When Select to Speak is turned on, Android reroutes the function of the physical volume buttons. Instead of controlling media volume or acting as a camera shutter, the buttons only adjust <strong>accessibility audio levels</strong>.</p>



<p>This means:</p>



<ul class="wp-block-list">
<li>Media playback volume cannot be changed using hardware keys</li>



<li>Volume buttons no longer work for taking photos in the camera app</li>



<li>Core hardware controls behave in unexpected ways</li>
</ul>



<p>For many users, this disrupts common workflows like quickly snapping photos or managing audio during calls, videos, or music playback.</p>



<h2 class="wp-block-heading"><strong>Who Is Affected and Why It Matters</strong></h2>



<p>Select to Speak is designed to help users with <strong>visual or reading difficulties</strong> by reading on-screen text aloud, even while other apps run in the background. However, the way it intercepts hardware button events appears to conflict with Android’s system-level volume handling.</p>



<p>This creates a difficult situation for users who:</p>



<ul class="wp-block-list">
<li>Depend on accessibility features daily</li>



<li>Also rely on hardware buttons for fast and reliable control</li>
</ul>



<p>In effect, users are forced to choose between accessibility support and basic device usability.</p>



<p>Google’s Android Community Team has acknowledged the issue through official support channels and confirmed that engineers are working on a fix.</p>



<h3 class="wp-block-heading">Temporary Workaround</h3>



<p>Until a permanent update is released, users can restore normal volume button behavior by:</p>



<ol class="wp-block-list">
<li>Opening <strong>Settings</strong></li>



<li>Going to <strong>Accessibility</strong></li>



<li>Selecting <strong>Select to Speak</strong></li>



<li>Turning the feature <strong>off</strong></li>
</ol>



<p>While this restores standard volume and camera functionality, it disables Select to Speak entirely.</p>



<p>Google is expected to release a patch that resolves how accessibility services interact with hardware controls. The fix will likely refine how key events are handled so accessibility features don’t override essential system functions.</p>



<p>This issue also highlights a broader challenge in Android development: ensuring accessibility improvements enhance usability without breaking core device behavior.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/volume-button/">Android Volume Button Bug Tied to Select to Speak Feature</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/volume-button/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Android Users Hit as Hackers Push Triada via Ad Networks</title>
		<link>https://firsthackersnews.com/triada/</link>
					<comments>https://firsthackersnews.com/triada/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 08 Dec 2025 18:57:13 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Android users]]></category>
		<category><![CDATA[d Networks]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Triada]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10782</guid>

					<description><![CDATA[<p>Adex, an anti-fraud platform under AdTech Holding, has uncovered and shut down a long-running malware scheme tied to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/triada/">Android Users Hit as Hackers Push Triada via Ad Networks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Adex, an anti-fraud platform under AdTech Holding, has uncovered and shut down a long-running malware scheme tied to the Triada Trojan. The operation had been active for several years and was quietly abusing the digital advertising ecosystem to infect Android users.</p>



<p>Triada is still one of the most common Android threats. Data from Q3 2025 shows it accounts for nearly 16% of all detected Android malware — proving it’s far from fading.</p>



<p>Adex’s investigation revealed that the Triada group spent the last five years trying to slip into legitimate ad networks. Instead of using typical malware delivery methods, the attackers went after trusted systems and platforms. They hijacked advertiser accounts, uploaded malicious APKs to places like GitHub and Discord CDNs, and used hidden redirects to avoid detection.</p>



<h2 class="wp-block-heading"><strong>How the attackers operated</strong></h2>



<p>The campaign evolved in three major stages:</p>



<p><strong>2020–2021:</strong><br>Attackers created fake advertiser accounts using poorly forged IDs and ran ads pointing to malware hosted on Discord CDNs and short links. Their landing pages imitated real service websites to look legitimate.</p>



<p><strong>2022–2024:</strong><br>The strategy shifted to taking over real advertiser accounts that did not have two-factor authentication enabled. Once inside, the attackers launched hidden ad campaigns that redirected users to malicious files hosted on trusted sources like GitHub.</p>



<p><strong>2025:</strong><br>The latest wave became even more advanced. Hackers used phishing pages pretending to be urgent Chrome updates and layered multiple redirects to hide the final malicious download. VirusTotal logs linked suspicious account activity to Turkey and India, pointing to a coordinated operation. In total, Adex discovered and banned more than 500 accounts tied to the scheme.</p>



<p>The case shows that even reputable domains and platforms can be misused for malware delivery. A clean domain no longer guarantees clean behavior.</p>



<h2 class="wp-block-heading"><strong>How Adex responded</strong></h2>



<p>To protect ad networks moving forward, Adex and PropellerAds rolled out stronger security measures. These include stricter KYC checks through Sumsub, mandatory 2FA for all advertiser accounts, login monitoring to catch anomalies, and full verification of redirects and domains — even when campaigns use well-known services like GitHub or Discord.</p>



<p>These steps have made it much harder for attackers to exploit ad infrastructure and helped secure the ecosystem against similar threats in the future.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/triada/">Android Users Hit as Hackers Push Triada via Ad Networks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/triada/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Android Users Hit by New Albiriox Malware</title>
		<link>https://firsthackersnews.com/albiriox-malware/</link>
					<comments>https://firsthackersnews.com/albiriox-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 01 Dec 2025 05:19:35 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Albiriox Malware]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10730</guid>

					<description><![CDATA[<p>Albiriox is a new Android malware that recently appeared on cybercrime forums. It offers advanced remote-access features and</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/albiriox-malware/">Android Users Hit by New Albiriox Malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Albiriox is a new Android malware that recently appeared on cybercrime forums. It offers advanced remote-access features and is sold as a Malware-as-a-Service tool. Researchers at Cleafy found that the main goal of this malware is to perform On-Device Fraud. It gives attackers full control of an infected device and lets them bypass security checks to steal money from banking apps.</p>



<h2 class="wp-block-heading"><strong>All about Albiriox malware</strong></h2>



<p>The malware first showed up in private forums in September 2025 and later became available to more buyers in October. The operation is linked to Russian-speaking threat actors who market the tool to cybercriminals. The subscription costs about $650 per month and gives access to the full set of features.</p>



<p>Albiriox is more advanced than normal credential stealers. It includes a VNC module that streams the victim’s screen in real time. Attackers can see everything happening on the device and control it as if they were holding the phone. </p>



<p>This real-time access lets them perform banking fraud directly on the device without the user noticing. Because the actions happen on the real device, the malware can bypass device fingerprinting and defeat two-factor authentication.</p>



<h2 class="wp-block-heading"><strong>Two-Stage Infection Chain</strong></h2>



<p>Albiriox spreads through a simple but effective two-step method designed to avoid detection. Early attacks focused on users in Austria by using a fake version of the popular Penny Market app.</p>



<p>The infection process works like this:</p>



<p>Victims receive an SMS with a shortened link offering prizes or discounts. The link leads to a fake Google Play Store page.<br>The user then downloads a dropper app, such as the fake Penny app.<br>After installation, the dropper asks for “Install Unknown Apps” permission and then downloads the real Albiriox malware from a command-and-control server.</p>



<p>Recent campaigns also use WhatsApp messages. Users are asked to enter their phone number to get the download link. This helps attackers target specific regions, such as Austria.</p>



<p>Albiriox is built for stealth and full control. It uses a service called Golden Crypt to stay hidden from antivirus tools. Once running, it abuses Accessibility Services to perform overlay attacks and record keystrokes.</p>



<p>The malware includes a hardcoded list of more than 400 apps. These apps include major banking apps, crypto wallets, and global payment services.</p>



<p><strong>Feature:</strong> Android banking trojan / Remote Access Trojan<br><strong>Model:</strong> Sold as Malware-as-a-Service<br><strong>Main Methods:</strong> On-device fraud, overlay attacks, VNC screen streaming<br><strong>Target Range:</strong> 400+ banking and crypto apps<br><strong>Evasion:</strong> Golden Crypt obfuscation, JSONPacker, two-stage dropper<br><strong>C2 Communication:</strong> Unencrypted TCP with JSON commands</p>



<p>Albiriox is evolving quickly and is becoming a strong tool for financial fraud. Its mix of screen streaming and accessibility abuse allows attackers to operate in the background without the user noticing, making it a major threat to Android users and financial institutions.</p>



<h2 class="wp-block-heading" id="h-iocs"><strong>IOCs</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th>Indicator Type</th><th>Value</th><th>Port / Notes</th></tr></thead><tbody><tr><td>C2 Server IP</td><td>194.32.79.94</td><td>5555 (Linked to samplef5b501e3…)</td></tr><tr><td>Delivery Domain</td><td>google-app-download[.]download</td><td>Phishing / Dropper Delivery</td></tr><tr><td>Delivery Domain</td><td>google-get[.]download</td><td>Phishing / Dropper Delivery</td></tr><tr><td>Delivery Domain</td><td>google-aplication[.]download</td><td>Phishing / Dropper Delivery</td></tr><tr><td>Delivery Domain</td><td>play.google-get[.]store</td><td>Phishing / Dropper Delivery</td></tr><tr><td>Delivery Domain</td><td>google-app-get[.]com</td><td>Phishing / Dropper Delivery</td></tr><tr><td>Delivery Domain</td><td>google-get-app[.]com</td><td>Phishing / Dropper Delivery</td></tr><tr><td>Delivery Domain</td><td>google-app-install[.]com</td><td>Phishing / Dropper Delivery</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/albiriox-malware/">Android Users Hit by New Albiriox Malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/albiriox-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Herodotus mimics humans to bypass biometrics</title>
		<link>https://firsthackersnews.com/herodotus/</link>
					<comments>https://firsthackersnews.com/herodotus/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 29 Oct 2025 05:35:34 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Android banking trojan]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Herodotus]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10560</guid>

					<description><![CDATA[<p>A sophisticated Android banking trojan called Herodotus has appeared, using new techniques to evade detection. All about the</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/herodotus/">Herodotus mimics humans to bypass biometrics</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A sophisticated Android banking trojan called Herodotus has appeared, using new techniques to evade detection. </p>



<h2 class="wp-block-heading"><strong>All about the malware-Herodotus</strong></h2>



<p>Found alongside Hook and Octo during routine monitoring, the samples more closely resemble Brokewell but include original code for advanced evasion. Active campaigns target users in Italy and Brazil, and the malware is being sold as Malware-as-a-Service by a threat actor named K1R0.</p>



<p>ThreatFabric found Herodotus follows modern banking-trojan trends but adds human-like remote-control input to evade behavioral biometric detection.</p>



<p>Herodotus begins with side-loading often delivered through SMiShing links that lure victims to malicious downloads. A custom dropper circumvents Android 13+ Accessibility Service restrictions by auto-installing the payload, opening the Accessibility settings and displaying a convincing loading overlay that hides the prompts used to grant powerful permissions. </p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="576" src="https://firsthackersnews.com/wp-content/uploads/2025/10/image-1024x576.png" alt="" class="wp-image-10561" srcset="https://firsthackersnews.com/wp-content/uploads/2025/10/image-200x113.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-300x169.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-400x225.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-600x338.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-768x432.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-800x450.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-1024x576.png 1024w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-1200x675.png 1200w, https://firsthackersnews.com/wp-content/uploads/2025/10/image-1536x864.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Source – Threat Fabric</em></figcaption></figure>



<p>After activation the trojan fingerprints the device by collecting the installed apps and sends that inventory to its command-and-control server, which returns a tailored list of high-value targets and overlay URLs. </p>



<p>The malware then injects realistic-looking fake login screens over legitimate banking apps and intercepts incoming SMS messages so it can harvest credentials and one-time codes in real time.</p>



<p>Where Herodotus stands out is in how it performs input during remote takeover. Instead of pasting whole strings via ACTION_SET_TEXT or the clipboard, which creates instant, machine-like input patterns, it breaks operator-supplied text into single characters and inserts them at randomized intervals. </p>



<p>This per-character, delayed typing produces timing and rhythm very similar to human typing, reducing anomaly signals and making behavioral anti-fraud systems less likely to flag the session as automated.</p>



<p>Herodotus inserts 300–3000 ms delays between keystrokes to mimic human typing and try to fool basic behavioral detectors, though advanced profiling systems can still spot anomalies. Operators enable it with a &#8220;Delayed text&#8221; checkbox in the control panel.</p>



<h3 class="wp-block-heading" id="indicators_of_compromise"><strong>Indicators of Compromise</strong></h3>



<h4 class="wp-block-heading"><strong>Sample</strong></h4>



<figure class="wp-block-table"><table><tbody><tr><td><strong>SHA-256</strong></td><td><strong>Package name</strong></td><td><strong>Application name</strong></td><td><strong>C2</strong></td></tr><tr><td>&nbsp;53ee40353e17d069b7b7783529edda968ad9ae25a0777f6a644b99551b412083&nbsp;</td><td>&nbsp;com.cd3.app&nbsp;</td><td>Chrome</td><td>gj23j4jg[.]google-firebase[.]digital</td></tr></tbody></table></figure>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/herodotus/">Herodotus mimics humans to bypass biometrics</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/herodotus/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New DCHSpy Malware Targets Android: Steals WhatsApp Data, Call Logs, and More</title>
		<link>https://firsthackersnews.com/dchspy-iranian-cyber-espionage-mobile-data-theft/</link>
					<comments>https://firsthackersnews.com/dchspy-iranian-cyber-espionage-mobile-data-theft/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 22 Jul 2025 12:36:52 +0000</pubDate>
				<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[#AndroidMalware]]></category>
		<category><![CDATA[#CyberEspionage]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DCHSpy]]></category>
		<category><![CDATA[#IranianCyberAttack]]></category>
		<category><![CDATA[#MobileDataTheft]]></category>
		<category><![CDATA[#MuddyWater]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10406</guid>

					<description><![CDATA[<p>&#8220;A New DCHSpy Variant Unveiled: Iranian Cyber Group MuddyWater Targets Mobile Data Amid Rising Israel-Iran Tensions&#8221; This advanced</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/dchspy-iranian-cyber-espionage-mobile-data-theft/">New DCHSpy Malware Targets Android: Steals WhatsApp Data, Call Logs, and More</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>&#8220;A New DCHSpy Variant Unveiled: Iranian Cyber Group MuddyWater Targets Mobile Data Amid Rising Israel-Iran Tensions&#8221;</p>



<p>This advanced version of the DCHSpy Android surveillance tool, deployed just a week after the escalation in the Israel-Iran conflict, marks a major leap in mobile surveillance technology. It focuses on stealing sensitive communications data, taking advantage of the current geopolitical unrest to trick victims into falling prey to the attack.</p>



<h2 class="wp-block-heading"><strong>The DCHSpy Malware: A Tool of MuddyWater’s Global Cyber Espionage Campaign</strong></h2>



<p>The DCHSpy malware family has been linked to MuddyWater, an Advanced Persistent Threat (APT) group with suspected ties to Iran’s Ministry of Intelligence and Security (MOIS). This cyber espionage group has a long history of targeting a wide array of government and private organizations, including those in telecommunications, defense, oil, and local government sectors, across the Middle East, Asia, Africa, Europe, and North America.</p>



<p>The timing of the latest DCHSpy samples is particularly noteworthy, appearing around a week after Israel’s first strikes on Iranian nuclear facilities.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="533" src="https://firsthackersnews.com/wp-content/uploads/2025/07/image-2-1024x533.png" alt="" class="wp-image-10407" srcset="https://firsthackersnews.com/wp-content/uploads/2025/07/image-2-200x104.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-2-300x156.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-2-400x208.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-2-600x312.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-2-768x400.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-2-800x417.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-2-1024x533.png 1024w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-2-1200x625.png 1200w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-2.png 1252w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The malware showcases ongoing development and increased sophistication, reflecting continued investment by state-sponsored actors in mobile surveillance technologies.</p>



<p>Technical analysis has revealed that DCHSpy shares infrastructure with another Android malware, SandStrike, which was previously used to target Baháʼí practitioners. Researchers also found that hardcoded command and control (C2) IP addresses were reused across different malware families, establishing clear connections between various campaigns.</p>



<h2 class="wp-block-heading"><strong>DCHSpy: A Sophisticated Modular Surveillanceware with Advanced Exfiltration Capabilities</strong></h2>



<p>DCHSpy operates as a highly modular surveillanceware platform with extensive data collection features. The malware systematically harvests sensitive data from infected devices, including:</p>



<ul class="wp-block-list">
<li><strong>User accounts</strong> logged into various apps</li>



<li><strong>Contacts</strong>, SMS messages, and local files</li>



<li><strong>Precise location data</strong> and complete call logs</li>



<li><strong>Audio recordings</strong> by taking control of device microphones</li>



<li><strong>Photos</strong> through manipulation of device cameras</li>
</ul>



<p>The latest variants have notably enhanced capabilities for extracting WhatsApp data, marking a significant advancement over previous versions.</p>



<p>Once the data is collected, it is compressed and encrypted using passwords received from Command and Control (C2) servers. The encrypted payload is then securely transmitted to Secure File Transfer Protocol (SFTP) servers, ensuring stealthy and effective exfiltration while evading detection.</p>



<p>Analyzed samples, such as one with the SHA1 hash 9dec46d71289710cd09582d84017718e0547f438, were found to be distributed under seemingly legitimate names, such as starlink_vpn(1.3.0)-3012 (1).apk, which highlights the sophisticated naming conventions used to mask its true intent.</p>



<p>MuddyWater, the APT group behind DCHSpy, employs social engineering tactics, capitalizing on timely political events and critical services to lure victims. The group typically distributes these malicious applications via Telegram channels, masquerading as legitimate VPN services like EarthVPN and ComodoVPN.</p>



<p>The distribution pages for DCHSpy are carefully crafted to appeal to both English and Farsi-speaking audiences who hold views opposing the Iranian regime. These pages use targeted language and themes designed to attract individuals in politically sensitive environments.</p>



<p>The integration of StarLink-themed lures is particularly significant, appearing to coincide with reports of StarLink providing internet services to Iranian citizens during government-imposed internet outages following the escalation of hostilities between Israel and Iran. This strategic timing showcases how threat actors take advantage of humanitarian crises and the need for internet connectivity to distribute malicious surveillance tools.</p>



<p>By exploiting these circumstances, DCHSpy targets activists and journalists operating in highly restrictive environments, using their vulnerability to deliver tools designed to monitor and suppress their activities. This highlights the increasing sophistication of cyber espionage tactics that manipulate geopolitical and social crises to achieve surveillance objectives.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/dchspy-iranian-cyber-espionage-mobile-data-theft/">New DCHSpy Malware Targets Android: Steals WhatsApp Data, Call Logs, and More</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/dchspy-iranian-cyber-espionage-mobile-data-theft/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New spyware tricks Android users for passwords</title>
		<link>https://firsthackersnews.com/spyware/</link>
					<comments>https://firsthackersnews.com/spyware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 04 Apr 2025 16:43:37 +0000</pubDate>
				<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[android spyware]]></category>
		<category><![CDATA[mobile security]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[spyware]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9959</guid>

					<description><![CDATA[<p>A new Android spyware app uses a password prompt to prevent uninstallation, making it difficult for users to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/spyware/">New spyware tricks Android users for passwords</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new Android spyware app uses a password prompt to prevent uninstallation, making it difficult for users to remove without the installer&#8217;s password.</p>



<h2 class="wp-block-heading"><strong>How the Spyware Works</strong></h2>



<p>The spyware, which TechCrunch chose not to name, exploits Android’s overlay permission to hijack the uninstall process. When a victim attempts to remove the app, a password prompt appears, blocking uninstallation unless the correct password—set by the installer—is entered.</p>



<p>Disguised under a generic name like “System Settings”, with an Android-default icon, the app hides from the home screen while secretly collecting and transmitting messages, photos, and real-time locations to an online dashboard controlled by the attacker.</p>



<p>This spyware falls into the growing category of consumer-grade surveillance tools, known as “stalkerware” or “spouseware.”</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="552" height="679" src="https://firsthackersnews.com/wp-content/uploads/2025/04/image-1.png" alt="" class="wp-image-9960" srcset="https://firsthackersnews.com/wp-content/uploads/2025/04/image-1-200x246.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-1-244x300.png 244w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-1-400x492.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-1.png 552w" sizes="auto, (max-width: 552px) 100vw, 552px" /><figcaption class="wp-element-caption">Reboot to safe mode<br></figcaption></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="552" height="679" src="https://firsthackersnews.com/wp-content/uploads/2025/04/image-2.png" alt="" class="wp-image-9961" srcset="https://firsthackersnews.com/wp-content/uploads/2025/04/image-2-200x246.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-2-244x300.png 244w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-2-400x492.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-2.png 552w" sizes="auto, (max-width: 552px) 100vw, 552px" /></figure>



<p>Although marketed for monitoring children or employees, these apps are often misused for spying on individuals without consent, which is both invasive and illegal.</p>



<p>They are usually downloaded from unofficial sources and require physical access to the victim’s phone and their passcode. Once installed, they exploit Android features like <strong>device admin privileges</strong> to stay hidden and prevent removal.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="340" height="680" src="https://firsthackersnews.com/wp-content/uploads/2025/04/image-3.png" alt="" class="wp-image-9962" srcset="https://firsthackersnews.com/wp-content/uploads/2025/04/image-3-150x300.png 150w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-3-200x400.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-3.png 340w" sizes="auto, (max-width: 340px) 100vw, 340px" /></figure>



<h2 class="wp-block-heading"><strong>Removing the Spyware</strong></h2>



<p>Here’s how to remove the spyware:</p>



<ol class="wp-block-list">
<li><strong>Reboot to Safe Mode</strong>: Hold down the power button, then press and hold the “Power Off” option. Confirm the “Reboot to Safe Mode” prompt.</li>



<li><strong>Identify Suspicious Apps</strong>: In safe mode, check the “Device Admin” apps in the settings and disable any unrecognized apps.</li>



<li><strong>Uninstall the Spyware</strong>: Go to the “Apps” settings, locate the spyware, and select “Uninstall.” Confirm the action.</li>
</ol>



<p>After removing the app, restart the phone to exit safe mode and secure your device with a stronger passcode to prevent future unauthorized access.</p>



<p>To protect your device, avoid downloading apps from untrusted sources and closely monitor app permissions. If you suspect spyware, consult specialized guides or report the incident to authorities if malicious intent is evident.</p>



<p>This incident highlights the growing sophistication of spyware apps and serves as a reminder for Android users to stay informed and proactive about securing their devices and data.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/spyware/">New spyware tricks Android users for passwords</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/spyware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Trinda Malware: Android Attack Replaces Call Numbers</title>
		<link>https://firsthackersnews.com/trinda-malware/</link>
					<comments>https://firsthackersnews.com/trinda-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 03 Apr 2025 22:25:47 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Android attack]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[Trinda Malware]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9947</guid>

					<description><![CDATA[<p>Kaspersky Lab has discovered a new version of the Triada Trojan targeting Android devices. This variant is pre-installed</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/trinda-malware/">Trinda Malware: Android Attack Replaces Call Numbers</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Kaspersky Lab has discovered a new version of the Triada Trojan targeting Android devices. This variant is pre-installed in counterfeit smartphones, often sold at discounted prices through unauthorized online stores.</p>



<h2 class="wp-block-heading"><strong>Trinda Malware</strong></h2>



<p>The malware, found in over 2,600 cases globally (mostly in Russia), embeds itself in the system framework, giving attackers full control over the device.</p>



<p>Its capabilities include stealing account info from apps like Telegram and TikTok, intercepting SMS, altering cryptocurrency wallet addresses, monitoring browsing activity, redirecting links, and rerouting phone calls to attackers.</p>



<p>Kaspersky Lab has uncovered a new version of the Triada Trojan that affects Android devices. This variant is pre-installed in counterfeit smartphones, often sold at lower prices through unauthorized online stores.</p>



<p>The malware has been found in over 2,600 cases globally, with most reports coming from Russia. Once installed, it embeds itself deeply in the device’s system framework, allowing attackers full control over the device.</p>



<p><strong>Key risks posed by the malware include:</strong></p>



<ul class="wp-block-list">
<li>Stealing user accounts from messaging apps like <strong>Telegram</strong> and <strong>TikTok</strong></li>



<li>Intercepting and altering SMS messages</li>



<li>Replacing cryptocurrency wallet addresses to redirect funds</li>



<li>Monitoring browsing activity and redirecting links</li>



<li>Replacing phone numbers during calls, rerouting communications to attackers</li>
</ul>



<p>Users are advised to be cautious when purchasing smartphones from unauthorized sources to avoid falling victim to this Trojan.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/trinda-malware/">Trinda Malware: Android Attack Replaces Call Numbers</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/trinda-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Android Zygote Flaw Enables Code Execution and Privilege Escalation</title>
		<link>https://firsthackersnews.com/android-zygote-flaw/</link>
					<comments>https://firsthackersnews.com/android-zygote-flaw/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 11 Mar 2025 01:39:12 +0000</pubDate>
				<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Android Zygote Flaw]]></category>
		<category><![CDATA[code execution]]></category>
		<category><![CDATA[CVE-2024-31317]]></category>
		<category><![CDATA[privilege escalation]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9764</guid>

					<description><![CDATA[<p>A major vulnerability, CVE-2024-31317, has been discovered in Android, allowing attackers to exploit the Zygote process for system-wide</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android-zygote-flaw/">Android Zygote Flaw Enables Code Execution and Privilege Escalation</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A major vulnerability, CVE-2024-31317, has been discovered in Android, allowing attackers to exploit the Zygote process for system-wide code execution and privilege escalation. This flaw affects devices running Android 11 or earlier, presenting a serious security risk.</p>



<h2 class="wp-block-heading"><strong>All about Android Zygote Flaw</strong></h2>



<p>The Zygote process is a core part of Android, responsible for launching new apps and system processes. Running with system privileges, it’s a prime target for attackers aiming for elevated access.</p>



<p>The vulnerability stems from how the System Server handles the hidden_api_blacklist_exemptions setting, which lets some apps bypass Android’s hidden API restrictions. </p>



<p>The issue occurs because the System Server doesn’t properly escape newlines in this setting when passing it to Zygote, allowing attackers to inject arbitrary commands into the Zygote process.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="612" height="502" src="https://firsthackersnews.com/wp-content/uploads/2025/03/image-2.png" alt="" class="wp-image-9765" srcset="https://firsthackersnews.com/wp-content/uploads/2025/03/image-2-200x164.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/03/image-2-300x246.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/03/image-2-400x328.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/03/image-2-600x492.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/03/image-2.png 612w" sizes="auto, (max-width: 612px) 100vw, 612px" /><figcaption class="wp-element-caption">An overview of the Android boot process<br><br>Attackers can exploit this vulnerability via the Android Debug Bridge (ADB) Shell, which has the WRITE_SECURE_SETTINGS permission to modify the hidden_api_blacklist_exemptions setting.<br><br>By injecting malicious commands, attackers can execute arbitrary code with system-wide privileges. A proof-of-concept shows how they can escalate privileges and maintain control by launching a persistent shell. Exploiting this vulnerability could cause severe issues, including device bootloops.<br><br><br></figcaption></figure>



<h2 class="wp-block-heading"><strong>Mitigation Steps </strong></h2>



<p>To mitigate the risks, users can restore normal Zygote behavior by deleting the modified hidden_api_blacklist_exemptions setting through ADB Shell and rebooting the device. However, this will also remove any injected payloads, requiring attackers to repeat the exploitation process to regain elevated access.</p>



<p>This discovery highlights the importance of securing Android&#8217;s core processes and the need for quick patches to prevent such exploits.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android-zygote-flaw/">Android Zygote Flaw Enables Code Execution and Privilege Escalation</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/android-zygote-flaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Android Phones Unlocked via Cellebrite Zero-Day Exploit</title>
		<link>https://firsthackersnews.com/cellebrite-zero-day-exploit/</link>
					<comments>https://firsthackersnews.com/cellebrite-zero-day-exploit/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 03 Mar 2025 02:58:10 +0000</pubDate>
				<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[Android phones]]></category>
		<category><![CDATA[Cellebrite]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Zero-day]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9733</guid>

					<description><![CDATA[<p>Amnesty International’s Security Lab discovered a cyber-espionage campaign in Serbia, where authorities used a zero-day exploit chain from</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cellebrite-zero-day-exploit/">Android Phones Unlocked via Cellebrite Zero-Day Exploit</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Amnesty International’s Security Lab discovered a cyber-espionage campaign in Serbia, where authorities used a zero-day exploit chain from Cellebrite to unlock a student activist&#8217;s Android phone.</p>



<h2 class="wp-block-heading"><strong>Cellebrite Zero-Day Exploit</strong></h2>



<p>The attack on December 25, 2024, used vulnerabilities in Linux kernel USB drivers to bypass lock-screen protections on a Samsung Galaxy A32. </p>



<p>Forensic analysis showed the exploit used outdated USB driver flaws to gain root access, extract data, and try to install surveillance tools. This highlights the misuse of digital forensics tools against civil society and gaps in Android&#8217;s protection against physical access attacks.</p>



<p>The attack used emulated USB devices to exploit memory corruption flaws in the Linux kernel. Forensic logs show authorities connected malicious devices via Cellebrite’s Turbo Link adapter, including:</p>



<ul class="wp-block-list">
<li>A Chicony CNF7129 webcam (CVE-2024-53104) targeting a USB Video Class driver flaw.</li>



<li>A Creative Extigy SoundBlaster (CVE-2024-53197) causing descriptor corruption during setup.</li>



<li>An Anton Touch Pad (CVE-2024-50302) leaking kernel memory through HID reports.</li>
</ul>



<p>These vulnerabilities, from code dating back to 2010-2013, were patched in Linux 6.6+ and the February 2025 Android Security Bulletin.</p>



<p>Attackers combined the flaws to escalate privileges, with kernel logs showing root access 10 seconds after the final USB HID device connection.</p>



<p>The victim, a 23-year-old student named &#8220;Vedran,&#8221; was detained during December 2024 protests in Serbia. Device logs support his account:</p>



<p>Post-exploitation activity included using find/grep for file enumeration and deploying Cellebrite’s “falcon” binary for data extraction. Although the target APK failed to install due to a biometric lock, the breach exposed call logs, messages, and protest details.</p>



<p>Google’s Threat Analysis Group worked with Amnesty to analyze the exploits, leading to patches for three CVEs. However, as of March 2025, over 40% of Android devices remain unpatched due to fragmented vendor updates.</p>



<p>Cellebrite suspended its Serbian clients on February 25, 2025, stating: “We found it appropriate to stop use of our products… Our compliance program ensures ethical, lawful use.” Critics argue this lacks transparency, as Cellebrite did not disclose the suspension duration or human rights safeguards. The company’s Premium UFED toolkit is still active in 78 countries despite abuse in 12 since 2022.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cellebrite-zero-day-exploit/">Android Phones Unlocked via Cellebrite Zero-Day Exploit</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cellebrite-zero-day-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
