Skip to main content

Datzbro: RAT Hiding Behind Senior Travel Scams

Medium
Published: Tue Sep 30 2025 (09/30/2025, 12:03:47 UTC)
Source: AlienVault OTX General

Description

A new Android Trojan named Datzbro has been discovered targeting seniors through fake Facebook groups promoting travel and social activities. The malware, which combines spyware and banking Trojan capabilities, is distributed via malicious APKs disguised as community apps. Datzbro features remote access, screen sharing, black overlay attacks, and keylogging, allowing attackers to perform financial fraud. It specifically targets banking and crypto-related apps, stealing credentials and sensitive information. The malware's origin appears to be Chinese-speaking developers, and its command-and-control application has been leaked, potentially making it a global threat. The campaign demonstrates the evolving sophistication of mobile threats, blending social engineering with advanced technical capabilities.

AI-Powered Analysis

AILast updated: 09/30/2025, 19:58:53 UTC

Technical Analysis

Datzbro is a newly identified Android Trojan that targets senior citizens by exploiting social engineering tactics through fake Facebook groups that promote travel and social activities. The malware is distributed via malicious APK files masquerading as legitimate community or social apps, which entices the target demographic to install them. Technically, Datzbro combines features of spyware and banking Trojans, enabling attackers to remotely access infected devices, capture screen content, perform black overlay attacks to deceive users, and log keystrokes. These capabilities allow attackers to steal sensitive information such as banking credentials and cryptocurrency wallet details. The malware specifically targets banking and crypto-related applications, facilitating financial fraud and theft. The origin of Datzbro appears to be Chinese-speaking developers, and notably, the command-and-control (C2) application used to manage infected devices has been leaked publicly, increasing the risk of widespread exploitation by multiple threat actors globally. This campaign exemplifies the increasing sophistication of mobile malware, blending advanced technical features with targeted social engineering to exploit a vulnerable population segment. While no CVE or known exploits in the wild have been reported yet, the combination of remote access, credential theft, and social engineering makes Datzbro a significant threat to Android users, especially seniors who may be less aware of such risks.

Potential Impact

For European organizations, the Datzbro Trojan poses a multifaceted threat. Although primarily targeting individual senior users, the financial fraud enabled by stolen banking and cryptocurrency credentials can have ripple effects on European financial institutions and payment ecosystems. Seniors are often less vigilant about cybersecurity, making them prime targets for infection, which can lead to direct financial losses and increased fraud claims. Additionally, compromised devices can be used as entry points for broader attacks, including lateral movement within corporate networks if personal devices are connected to enterprise resources. The leak of the C2 application raises the possibility of multiple threat actors adopting and modifying Datzbro, potentially increasing attack volume and diversity. The targeting of crypto apps is particularly relevant given the growing adoption of cryptocurrencies in Europe, potentially leading to theft of digital assets. The social engineering vector via Facebook groups also highlights the risk of misinformation and manipulation campaigns that could further erode trust in social platforms. Overall, the threat could increase fraud-related operational costs, damage reputations, and lead to regulatory scrutiny under GDPR if personal data is compromised.

Mitigation Recommendations

To mitigate the threat posed by Datzbro, European organizations and individuals should implement targeted measures beyond generic advice. First, awareness campaigns specifically aimed at seniors should be conducted to educate them about the risks of installing apps from unofficial sources and the dangers of social engineering via social media platforms. Organizations should encourage the use of official app stores and verify app authenticity before installation. Mobile device management (MDM) solutions can be deployed to restrict installation of APKs from unknown sources on corporate or BYOD devices. Banks and crypto service providers should implement multi-factor authentication (MFA) and anomaly detection systems to identify suspicious login patterns indicative of credential theft. Financial institutions could also monitor for black overlay attack indicators and unusual transaction behaviors. Facebook and social media platforms should be engaged to identify and remove fake groups promoting scams targeting seniors. Regular updates and patches for Android devices should be enforced to reduce exploitation of known vulnerabilities. Finally, incident response plans should include procedures for detecting and responding to mobile malware infections, including forensic analysis of compromised devices and notification to affected users.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.threatfabric.com/blogs/datzbro-rat-hiding-behind-senior-travel-scams"]
Adversary
null
Pulse Id
68dbc723efac718f1d90b6de
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash1d6131755bc1a5ec334d4e2ad641888b
hash9a632d442b462e80b6e28380ce7de2f441410ab8
hash453b0a62e414e9b40185c63842546fc96e8e1ab3f77d3230b02988dd8834c555
hasha57d70b2873d9a3672eda76733c5b2fb96dca502958064fab742cfc074bf0feb
hashed2313bfebe03ff29a7c802ddd471583cc8da76bf5cb9f418ae7d999d6a0b9fb
hashfac119c569ba7dd19df9154f22f928cf3f0b0165bbe7d6b11a77215bdfc2a11a

Threat ID: 68dc36656cc735edd4bd9857

Added to database: 9/30/2025, 7:58:29 PM

Last enriched: 9/30/2025, 7:58:53 PM

Last updated: 10/1/2025, 12:07:30 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats