Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
Cybersecurity researchers have disclosed details of two new Android malware families dubbed FvncBot and SeedSnatcher, as another upgraded version of ClayRat has been spotted in the wild. The findings come from Intel 471, CYFIRMA, and Zimperium, respectively. FvncBot, which masquerades as a security app developed by mBank, targets mobile banking users in Poland. What's notable about the malware
AI Analysis
Technical Summary
The disclosed Android malware families—FvncBot, SeedSnatcher, and ClayRat—represent a significant evolution in mobile banking and cryptocurrency theft threats. FvncBot is a newly developed banking trojan targeting Polish users by impersonating a legitimate security app from mBank. It is built from scratch, not derived from leaked source codes of previous trojans, and incorporates multiple advanced features such as keylogging via Android accessibility services, web-inject attacks, screen streaming, and hidden virtual network computing (HVNC). The malware uses a dropper app that tricks users into installing a fake Google Play component, leveraging session-based techniques to bypass accessibility restrictions on Android 13+. Once installed, it requests accessibility permissions to gain elevated privileges, enabling remote control of the device through WebSocket connections, exfiltration of keystrokes, device info, installed apps, and the deployment of malicious overlays to capture sensitive data. Communication with the command-and-control server is maintained via HTTP and Firebase Cloud Messaging. SeedSnatcher, distributed via Telegram under the name Coin, targets cryptocurrency wallets by stealing seed phrases and intercepting SMS 2FA codes. It uses advanced evasion techniques including dynamic class loading and stealthy WebView injections. Initially requesting minimal permissions, it escalates privileges to access files, contacts, call logs, and display phishing overlays. Its operator profile suggests Chinese or Chinese-speaking origins. ClayRat’s upgraded version now abuses accessibility services and default SMS permissions to enable full device takeover. It can record keystrokes and screen content, display overlays mimicking system updates, harvest notifications, and automate unlocking of device PINs or patterns. ClayRat is distributed through phishing domains impersonating popular services like YouTube and Russian taxi apps. These malware families collectively exploit Android’s accessibility services, a feature intended for users with disabilities, to gain extensive control over devices, evade detection, and steal financial and personal data. The use of crypting services and session-based deployment methods further complicates detection and mitigation efforts.
Potential Impact
For European organizations, especially financial institutions and cryptocurrency service providers, these malware families pose a direct threat to mobile banking security and digital asset safety. The targeting of Polish users by FvncBot indicates a focused campaign that could lead to significant financial losses and erosion of trust in mobile banking platforms. SeedSnatcher’s ability to steal seed phrases and 2FA codes threatens the security of cryptocurrency holdings, potentially impacting fintech companies and crypto exchanges operating in Europe. ClayRat’s enhanced capabilities for full device takeover increase risks of espionage, data leakage, and unauthorized access to corporate communications and credentials. The abuse of accessibility services and SMS permissions can bypass traditional security controls, making detection difficult and increasing the likelihood of successful breaches. The malware’s persistence and stealth features could lead to prolonged undetected compromises, affecting confidentiality, integrity, and availability of critical mobile endpoints. This threat landscape necessitates heightened vigilance for European organizations relying on Android mobile platforms for sensitive operations.
Mitigation Recommendations
European organizations should implement targeted defenses beyond generic mobile security advice. First, enforce strict application vetting policies, restricting installation to verified sources such as the official Google Play Store and employing mobile threat defense (MTD) solutions capable of detecting behavior indicative of accessibility service abuse and overlay attacks. Deploy endpoint detection and response (EDR) tools with mobile capabilities to monitor for suspicious use of accessibility APIs, screen recording, and unauthorized overlay creation. Educate users, particularly in financial sectors, about phishing risks, the dangers of sideloading apps, and the importance of scrutinizing permission requests, especially accessibility and SMS access. Implement multi-factor authentication methods that do not rely solely on SMS-based 2FA to mitigate interception risks. Regularly audit and monitor network traffic for anomalous connections to known command-and-control domains such as naleymilva.it.com. Collaborate with mobile OS providers to apply the latest security patches and consider deploying app behavior anomaly detection systems. For organizations with cryptocurrency exposure, encourage the use of hardware wallets or secure enclave technologies to protect seed phrases. Finally, conduct threat hunting exercises focused on detecting these malware families’ indicators and behaviors within corporate mobile environments.
Affected Countries
Poland, Germany, France, United Kingdom, Italy, Spain, Netherlands
Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
Description
Cybersecurity researchers have disclosed details of two new Android malware families dubbed FvncBot and SeedSnatcher, as another upgraded version of ClayRat has been spotted in the wild. The findings come from Intel 471, CYFIRMA, and Zimperium, respectively. FvncBot, which masquerades as a security app developed by mBank, targets mobile banking users in Poland. What's notable about the malware
AI-Powered Analysis
Technical Analysis
The disclosed Android malware families—FvncBot, SeedSnatcher, and ClayRat—represent a significant evolution in mobile banking and cryptocurrency theft threats. FvncBot is a newly developed banking trojan targeting Polish users by impersonating a legitimate security app from mBank. It is built from scratch, not derived from leaked source codes of previous trojans, and incorporates multiple advanced features such as keylogging via Android accessibility services, web-inject attacks, screen streaming, and hidden virtual network computing (HVNC). The malware uses a dropper app that tricks users into installing a fake Google Play component, leveraging session-based techniques to bypass accessibility restrictions on Android 13+. Once installed, it requests accessibility permissions to gain elevated privileges, enabling remote control of the device through WebSocket connections, exfiltration of keystrokes, device info, installed apps, and the deployment of malicious overlays to capture sensitive data. Communication with the command-and-control server is maintained via HTTP and Firebase Cloud Messaging. SeedSnatcher, distributed via Telegram under the name Coin, targets cryptocurrency wallets by stealing seed phrases and intercepting SMS 2FA codes. It uses advanced evasion techniques including dynamic class loading and stealthy WebView injections. Initially requesting minimal permissions, it escalates privileges to access files, contacts, call logs, and display phishing overlays. Its operator profile suggests Chinese or Chinese-speaking origins. ClayRat’s upgraded version now abuses accessibility services and default SMS permissions to enable full device takeover. It can record keystrokes and screen content, display overlays mimicking system updates, harvest notifications, and automate unlocking of device PINs or patterns. ClayRat is distributed through phishing domains impersonating popular services like YouTube and Russian taxi apps. These malware families collectively exploit Android’s accessibility services, a feature intended for users with disabilities, to gain extensive control over devices, evade detection, and steal financial and personal data. The use of crypting services and session-based deployment methods further complicates detection and mitigation efforts.
Potential Impact
For European organizations, especially financial institutions and cryptocurrency service providers, these malware families pose a direct threat to mobile banking security and digital asset safety. The targeting of Polish users by FvncBot indicates a focused campaign that could lead to significant financial losses and erosion of trust in mobile banking platforms. SeedSnatcher’s ability to steal seed phrases and 2FA codes threatens the security of cryptocurrency holdings, potentially impacting fintech companies and crypto exchanges operating in Europe. ClayRat’s enhanced capabilities for full device takeover increase risks of espionage, data leakage, and unauthorized access to corporate communications and credentials. The abuse of accessibility services and SMS permissions can bypass traditional security controls, making detection difficult and increasing the likelihood of successful breaches. The malware’s persistence and stealth features could lead to prolonged undetected compromises, affecting confidentiality, integrity, and availability of critical mobile endpoints. This threat landscape necessitates heightened vigilance for European organizations relying on Android mobile platforms for sensitive operations.
Mitigation Recommendations
European organizations should implement targeted defenses beyond generic mobile security advice. First, enforce strict application vetting policies, restricting installation to verified sources such as the official Google Play Store and employing mobile threat defense (MTD) solutions capable of detecting behavior indicative of accessibility service abuse and overlay attacks. Deploy endpoint detection and response (EDR) tools with mobile capabilities to monitor for suspicious use of accessibility APIs, screen recording, and unauthorized overlay creation. Educate users, particularly in financial sectors, about phishing risks, the dangers of sideloading apps, and the importance of scrutinizing permission requests, especially accessibility and SMS access. Implement multi-factor authentication methods that do not rely solely on SMS-based 2FA to mitigate interception risks. Regularly audit and monitor network traffic for anomalous connections to known command-and-control domains such as naleymilva.it.com. Collaborate with mobile OS providers to apply the latest security patches and consider deploying app behavior anomaly detection systems. For organizations with cryptocurrency exposure, encourage the use of hardware wallets or secure enclave technologies to protect seed phrases. Finally, conduct threat hunting exercises focused on detecting these malware families’ indicators and behaviors within corporate mobile environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/12/android-malware-fvncbot-seedsnatcher.html","fetched":true,"fetchedAt":"2025-12-08T11:59:27.873Z","wordCount":1483}
Threat ID: 6936bda25f72f49d151d2502
Added to database: 12/8/2025, 11:59:30 AM
Last enriched: 12/8/2025, 11:59:48 AM
Last updated: 12/9/2025, 10:12:42 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data
MediumThreatFox IOCs for 2025-12-08
MediumChrimeraWire Trojan Targets Windows, Fakes Chrome Activity to Manipulate Search Rankings
MediumExperts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT
Medium⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.