Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

DTO malware that takes notes

0
Medium
Published: Thu Mar 19 2026 (03/19/2026, 11:00:48 UTC)
Source: AlienVault OTX General

Description

Perseus is a new Android threat that builds upon earlier malware families like Cerberus and Phoenix. It enables real-time monitoring and interaction with infected devices through Accessibility-based remote sessions, allowing full Device Takeover. The malware focuses on extracting high-value personal information, including monitoring user notes. It employs strong anti-analysis measures to evade detection. Perseus is primarily distributed through IPTV applications, targeting users in Turkey and Italy. Its capabilities include overlay attacks, keylogging, and systematic exploration of note-taking apps. The malware performs extensive environment checks to detect analysis conditions and assess device risk. Perseus represents the ongoing evolution of mobile malware, adapting to remain effective in an increasingly secure mobile environment.

AI-Powered Analysis

AILast updated: 03/19/2026, 14:09:51 UTC

Technical Analysis

Perseus is a newly identified Android malware strain that extends the capabilities of earlier families such as Cerberus and Phoenix. It leverages Android's Accessibility services to establish remote sessions that allow attackers to fully control infected devices, effectively achieving Device Takeover (DTO). This control enables real-time monitoring and interaction with the device, including overlay attacks that can deceive users by displaying fake screens, and keylogging to capture sensitive input. A particular focus of Perseus is the extraction of high-value personal information, notably by systematically exploring and monitoring note-taking applications to steal user notes. The malware is primarily distributed through IPTV applications, which are popular in Turkey and Italy, indicating a targeted regional focus. Perseus employs advanced anti-analysis techniques, including extensive environment checks to detect emulators, debuggers, or sandbox environments, thereby evading detection and complicating forensic analysis. These checks also help the malware assess the risk level of the infected device to adapt its behavior accordingly. While no CVE or known exploits in the wild have been reported, the malware’s sophisticated features and stealth capabilities represent a significant evolution in mobile threats. The use of Accessibility services for remote control is particularly concerning as it bypasses many traditional security controls. Indicators of compromise include multiple file hashes associated with the malware binaries. The threat is currently rated medium severity but requires close monitoring due to its potential to compromise user privacy and device integrity.

Potential Impact

The impact of Perseus malware on organizations and individuals is significant, especially for those relying on Android devices for sensitive communications and data storage. By enabling full device takeover, attackers can access confidential information, including personal notes, credentials, and potentially financial data. The real-time remote control capability allows attackers to manipulate device functions, intercept communications, and install additional malicious payloads. Overlay attacks can trick users into divulging sensitive information or performing unauthorized actions. The malware’s anti-analysis features hinder detection and remediation efforts, increasing dwell time and potential damage. For organizations, compromised employee devices could lead to data breaches, unauthorized access to corporate systems, and loss of intellectual property. The focus on IPTV apps as a distribution vector suggests a risk to users who consume streaming content via unofficial or third-party applications, which may be common in certain regions. The targeted countries, Turkey and Italy, face heightened risk, but the malware’s techniques could be adapted to other markets, potentially expanding its impact. Overall, Perseus threatens confidentiality, integrity, and availability of Android devices, posing privacy risks and operational disruptions.

Mitigation Recommendations

To mitigate the risk posed by Perseus malware, organizations and users should implement a multi-layered approach beyond generic advice: 1) Restrict installation of applications from untrusted sources, especially IPTV and third-party app stores; enforce policies to allow only vetted apps. 2) Monitor and restrict Accessibility service permissions, as misuse of these services is central to Perseus’s operation; regularly audit apps with Accessibility privileges. 3) Deploy mobile threat defense (MTD) solutions capable of detecting overlay attacks, keylogging behaviors, and suspicious Accessibility service usage. 4) Educate users about the risks of installing IPTV apps from unofficial sources and the dangers of granting Accessibility permissions to unknown apps. 5) Implement behavioral analytics to detect anomalous device activity indicative of remote control or overlay attacks. 6) Use endpoint detection and response (EDR) tools with mobile support to identify and quarantine infected devices promptly. 7) Regularly update Android OS and security patches to reduce exploitation surface. 8) Employ network-level controls to detect and block communication with known malicious command-and-control servers associated with Perseus. 9) Conduct threat hunting using provided file hashes and indicators of compromise to identify infections early. 10) For high-risk environments, consider restricting use of note-taking apps or segregating sensitive data from mobile devices. These targeted measures will help reduce infection likelihood and limit malware impact.

Affected Countries

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.threatfabric.com/blogs/perseus-dto-malware-that-takes-notes"]
Adversary
Perseus
Pulse Id
69bbd760259c3146a2621e01
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashd8081fe3a360d6957829ea2c66b966c2
hashe0e427d6dd2f8fa088a1d8a400a64620
hash245c0ce14ccab1e6569275ff36556f19f4da453a
hashb5ba10ae9b17f99915e456d236c0ea5177c0cbe4
hash1ea8360c4d3b7ccea50e9f19630be9d23df26ac713799e2f8457520c0d29bdda
hash2524e9d5ed1e55332fe2d1cc0e7ad4e2656ad5ca624199e6f619325979b3529a
hash56d3bb5e8771b41b11d368e70ddd26fe6f1e7bd00b3aafcfd4c34ef62f87093d

Threat ID: 69bbffd8e32a4fbe5fc68b20

Added to database: 3/19/2026, 1:53:28 PM

Last enriched: 3/19/2026, 2:09:51 PM

Last updated: 3/20/2026, 3:59:01 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses