DTO malware that takes notes
Perseus is a new Android threat that builds upon earlier malware families like Cerberus and Phoenix. It enables real-time monitoring and interaction with infected devices through Accessibility-based remote sessions, allowing full Device Takeover. The malware focuses on extracting high-value personal information, including monitoring user notes. It employs strong anti-analysis measures to evade detection. Perseus is primarily distributed through IPTV applications, targeting users in Turkey and Italy. Its capabilities include overlay attacks, keylogging, and systematic exploration of note-taking apps. The malware performs extensive environment checks to detect analysis conditions and assess device risk. Perseus represents the ongoing evolution of mobile malware, adapting to remain effective in an increasingly secure mobile environment.
AI Analysis
Technical Summary
Perseus is a newly identified Android malware strain that extends the capabilities of earlier families such as Cerberus and Phoenix. It leverages Android's Accessibility services to establish remote sessions that allow attackers to fully control infected devices, effectively achieving Device Takeover (DTO). This control enables real-time monitoring and interaction with the device, including overlay attacks that can deceive users by displaying fake screens, and keylogging to capture sensitive input. A particular focus of Perseus is the extraction of high-value personal information, notably by systematically exploring and monitoring note-taking applications to steal user notes. The malware is primarily distributed through IPTV applications, which are popular in Turkey and Italy, indicating a targeted regional focus. Perseus employs advanced anti-analysis techniques, including extensive environment checks to detect emulators, debuggers, or sandbox environments, thereby evading detection and complicating forensic analysis. These checks also help the malware assess the risk level of the infected device to adapt its behavior accordingly. While no CVE or known exploits in the wild have been reported, the malware’s sophisticated features and stealth capabilities represent a significant evolution in mobile threats. The use of Accessibility services for remote control is particularly concerning as it bypasses many traditional security controls. Indicators of compromise include multiple file hashes associated with the malware binaries. The threat is currently rated medium severity but requires close monitoring due to its potential to compromise user privacy and device integrity.
Potential Impact
The impact of Perseus malware on organizations and individuals is significant, especially for those relying on Android devices for sensitive communications and data storage. By enabling full device takeover, attackers can access confidential information, including personal notes, credentials, and potentially financial data. The real-time remote control capability allows attackers to manipulate device functions, intercept communications, and install additional malicious payloads. Overlay attacks can trick users into divulging sensitive information or performing unauthorized actions. The malware’s anti-analysis features hinder detection and remediation efforts, increasing dwell time and potential damage. For organizations, compromised employee devices could lead to data breaches, unauthorized access to corporate systems, and loss of intellectual property. The focus on IPTV apps as a distribution vector suggests a risk to users who consume streaming content via unofficial or third-party applications, which may be common in certain regions. The targeted countries, Turkey and Italy, face heightened risk, but the malware’s techniques could be adapted to other markets, potentially expanding its impact. Overall, Perseus threatens confidentiality, integrity, and availability of Android devices, posing privacy risks and operational disruptions.
Mitigation Recommendations
To mitigate the risk posed by Perseus malware, organizations and users should implement a multi-layered approach beyond generic advice: 1) Restrict installation of applications from untrusted sources, especially IPTV and third-party app stores; enforce policies to allow only vetted apps. 2) Monitor and restrict Accessibility service permissions, as misuse of these services is central to Perseus’s operation; regularly audit apps with Accessibility privileges. 3) Deploy mobile threat defense (MTD) solutions capable of detecting overlay attacks, keylogging behaviors, and suspicious Accessibility service usage. 4) Educate users about the risks of installing IPTV apps from unofficial sources and the dangers of granting Accessibility permissions to unknown apps. 5) Implement behavioral analytics to detect anomalous device activity indicative of remote control or overlay attacks. 6) Use endpoint detection and response (EDR) tools with mobile support to identify and quarantine infected devices promptly. 7) Regularly update Android OS and security patches to reduce exploitation surface. 8) Employ network-level controls to detect and block communication with known malicious command-and-control servers associated with Perseus. 9) Conduct threat hunting using provided file hashes and indicators of compromise to identify infections early. 10) For high-risk environments, consider restricting use of note-taking apps or segregating sensitive data from mobile devices. These targeted measures will help reduce infection likelihood and limit malware impact.
Affected Countries
Turkey, Italy
Indicators of Compromise
- hash: d8081fe3a360d6957829ea2c66b966c2
- hash: e0e427d6dd2f8fa088a1d8a400a64620
- hash: 245c0ce14ccab1e6569275ff36556f19f4da453a
- hash: b5ba10ae9b17f99915e456d236c0ea5177c0cbe4
- hash: 1ea8360c4d3b7ccea50e9f19630be9d23df26ac713799e2f8457520c0d29bdda
- hash: 2524e9d5ed1e55332fe2d1cc0e7ad4e2656ad5ca624199e6f619325979b3529a
- hash: 56d3bb5e8771b41b11d368e70ddd26fe6f1e7bd00b3aafcfd4c34ef62f87093d
DTO malware that takes notes
Description
Perseus is a new Android threat that builds upon earlier malware families like Cerberus and Phoenix. It enables real-time monitoring and interaction with infected devices through Accessibility-based remote sessions, allowing full Device Takeover. The malware focuses on extracting high-value personal information, including monitoring user notes. It employs strong anti-analysis measures to evade detection. Perseus is primarily distributed through IPTV applications, targeting users in Turkey and Italy. Its capabilities include overlay attacks, keylogging, and systematic exploration of note-taking apps. The malware performs extensive environment checks to detect analysis conditions and assess device risk. Perseus represents the ongoing evolution of mobile malware, adapting to remain effective in an increasingly secure mobile environment.
AI-Powered Analysis
Technical Analysis
Perseus is a newly identified Android malware strain that extends the capabilities of earlier families such as Cerberus and Phoenix. It leverages Android's Accessibility services to establish remote sessions that allow attackers to fully control infected devices, effectively achieving Device Takeover (DTO). This control enables real-time monitoring and interaction with the device, including overlay attacks that can deceive users by displaying fake screens, and keylogging to capture sensitive input. A particular focus of Perseus is the extraction of high-value personal information, notably by systematically exploring and monitoring note-taking applications to steal user notes. The malware is primarily distributed through IPTV applications, which are popular in Turkey and Italy, indicating a targeted regional focus. Perseus employs advanced anti-analysis techniques, including extensive environment checks to detect emulators, debuggers, or sandbox environments, thereby evading detection and complicating forensic analysis. These checks also help the malware assess the risk level of the infected device to adapt its behavior accordingly. While no CVE or known exploits in the wild have been reported, the malware’s sophisticated features and stealth capabilities represent a significant evolution in mobile threats. The use of Accessibility services for remote control is particularly concerning as it bypasses many traditional security controls. Indicators of compromise include multiple file hashes associated with the malware binaries. The threat is currently rated medium severity but requires close monitoring due to its potential to compromise user privacy and device integrity.
Potential Impact
The impact of Perseus malware on organizations and individuals is significant, especially for those relying on Android devices for sensitive communications and data storage. By enabling full device takeover, attackers can access confidential information, including personal notes, credentials, and potentially financial data. The real-time remote control capability allows attackers to manipulate device functions, intercept communications, and install additional malicious payloads. Overlay attacks can trick users into divulging sensitive information or performing unauthorized actions. The malware’s anti-analysis features hinder detection and remediation efforts, increasing dwell time and potential damage. For organizations, compromised employee devices could lead to data breaches, unauthorized access to corporate systems, and loss of intellectual property. The focus on IPTV apps as a distribution vector suggests a risk to users who consume streaming content via unofficial or third-party applications, which may be common in certain regions. The targeted countries, Turkey and Italy, face heightened risk, but the malware’s techniques could be adapted to other markets, potentially expanding its impact. Overall, Perseus threatens confidentiality, integrity, and availability of Android devices, posing privacy risks and operational disruptions.
Mitigation Recommendations
To mitigate the risk posed by Perseus malware, organizations and users should implement a multi-layered approach beyond generic advice: 1) Restrict installation of applications from untrusted sources, especially IPTV and third-party app stores; enforce policies to allow only vetted apps. 2) Monitor and restrict Accessibility service permissions, as misuse of these services is central to Perseus’s operation; regularly audit apps with Accessibility privileges. 3) Deploy mobile threat defense (MTD) solutions capable of detecting overlay attacks, keylogging behaviors, and suspicious Accessibility service usage. 4) Educate users about the risks of installing IPTV apps from unofficial sources and the dangers of granting Accessibility permissions to unknown apps. 5) Implement behavioral analytics to detect anomalous device activity indicative of remote control or overlay attacks. 6) Use endpoint detection and response (EDR) tools with mobile support to identify and quarantine infected devices promptly. 7) Regularly update Android OS and security patches to reduce exploitation surface. 8) Employ network-level controls to detect and block communication with known malicious command-and-control servers associated with Perseus. 9) Conduct threat hunting using provided file hashes and indicators of compromise to identify infections early. 10) For high-risk environments, consider restricting use of note-taking apps or segregating sensitive data from mobile devices. These targeted measures will help reduce infection likelihood and limit malware impact.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.threatfabric.com/blogs/perseus-dto-malware-that-takes-notes"]
- Adversary
- Perseus
- Pulse Id
- 69bbd760259c3146a2621e01
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashd8081fe3a360d6957829ea2c66b966c2 | — | |
hashe0e427d6dd2f8fa088a1d8a400a64620 | — | |
hash245c0ce14ccab1e6569275ff36556f19f4da453a | — | |
hashb5ba10ae9b17f99915e456d236c0ea5177c0cbe4 | — | |
hash1ea8360c4d3b7ccea50e9f19630be9d23df26ac713799e2f8457520c0d29bdda | — | |
hash2524e9d5ed1e55332fe2d1cc0e7ad4e2656ad5ca624199e6f619325979b3529a | — | |
hash56d3bb5e8771b41b11d368e70ddd26fe6f1e7bd00b3aafcfd4c34ef62f87093d | — |
Threat ID: 69bbffd8e32a4fbe5fc68b20
Added to database: 3/19/2026, 1:53:28 PM
Last enriched: 3/19/2026, 2:09:51 PM
Last updated: 3/20/2026, 3:59:01 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.