Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events

0
Medium
Published: Tue Sep 30 2025 (09/30/2025, 09:20:00 UTC)
Source: The Hacker News

Description

Datzbro is a newly discovered Android banking trojan targeting elderly users through AI-generated Facebook travel event scams. It tricks victims into downloading malicious APKs via fake community apps that promise social activities, enabling device takeover and financial fraud. The malware exploits Android accessibility services to remotely control devices, steal credentials, and conduct overlay attacks. It specifically targets banking and cryptocurrency apps, capturing PINs and passwords. The campaign has been observed in Australia, the U. K. , and other countries, with indications of expansion to iOS. The trojan’s operators use a Chinese-language command-and-control backend, suggesting a Chinese-speaking threat actor. The malware’s sophisticated remote control and social engineering tactics pose a significant risk to vulnerable populations. European organizations, especially those serving elderly users, should be vigilant.

AI-Powered Analysis

AILast updated: 10/07/2025, 01:13:32 UTC

Technical Analysis

Datzbro is an Android banking trojan first identified in August 2025 by ThreatFabric, targeting elderly users through social engineering campaigns on Facebook. The attackers create AI-generated Facebook groups promoting fake travel and social events for seniors, exploiting their trust and desire for community engagement. Victims are contacted via Facebook Messenger or WhatsApp and persuaded to download malicious APKs from fraudulent websites masquerading as community apps. These apps either directly deploy the trojan or use a dropper built with APK binding services like Zombinder to evade Android 13+ security restrictions. Datzbro leverages Android accessibility services to perform device takeover (DTO) attacks, enabling remote control of the device, overlay attacks to hide malicious activity, keylogging, and credential theft. It captures sensitive information such as lock screen PINs and passwords for financial apps including Alipay and WeChat, and monitors accessibility event logs for banking and cryptocurrency wallet apps. The malware’s remote control mode sends detailed UI element data to operators, allowing them to replicate the device screen and interact with it remotely. The trojan is linked to a Chinese-language desktop command-and-control backend, distinct from typical web-based C2 panels, indicating a Chinese-speaking threat actor. The malware is distributed through multiple fake Android apps with names appealing to seniors. There is also evidence of attempts to target iOS users via TestFlight apps. While no known exploits are reported in the wild beyond these campaigns, the malware’s capabilities pose a high risk of financial fraud and identity theft. The campaign’s focus on elderly victims and use of AI-generated content for social engineering mark an evolution in mobile threat tactics. The malware’s presence in countries including Australia, Singapore, Malaysia, Canada, South Africa, and the U.K. suggests a broad geographic scope. The campaign’s sophistication and targeted approach highlight the need for specialized detection and prevention strategies.

Potential Impact

For European organizations, particularly those providing services to elderly populations or managing mobile banking platforms, Datzbro represents a significant threat. The trojan’s ability to perform device takeover and financial fraud can lead to direct monetary losses for victims and reputational damage for financial institutions. Elderly users are especially vulnerable due to targeted social engineering tactics exploiting their trust and social needs. Healthcare providers, senior care organizations, and community groups facilitating social activities for seniors may inadvertently become vectors for infection. The malware’s use of accessibility services and overlay attacks complicates detection and remediation, potentially allowing prolonged unauthorized access. Financial institutions could face increased fraud claims and regulatory scrutiny if customers are compromised. Additionally, the trojan’s capability to steal credentials and PINs threatens confidentiality and integrity of sensitive financial data. The campaign’s expansion to iOS platforms could further increase the attack surface. European cybersecurity teams must prepare for potential incidents involving this malware, especially as it leverages social media platforms popular in Europe. The threat also underscores the importance of protecting vulnerable user groups from sophisticated social engineering and mobile malware attacks.

Mitigation Recommendations

European organizations should implement targeted awareness campaigns aimed at elderly users, educating them about the risks of downloading apps from unofficial sources and interacting with unsolicited social media invitations. Financial institutions should enhance monitoring for anomalous transactions and implement multi-factor authentication (MFA) that resists interception by malware. Mobile device management (MDM) solutions can enforce policies restricting APK sideloading and limit accessibility service permissions to trusted apps only. Security teams should deploy behavioral detection tools capable of identifying overlay attacks and suspicious accessibility service usage. Collaboration with social media platforms to identify and dismantle fraudulent groups promoting such scams is critical. Incident response plans should include procedures for rapid containment and remediation of infected devices, including remote wiping and credential resets. Regular threat intelligence sharing within European cybersecurity communities can facilitate early detection of emerging variants. Finally, encouraging users to keep devices updated and use Google Play Protect or equivalent security services can reduce infection likelihood.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/09/new-android-trojan-datzbro-tricking.html","fetched":true,"fetchedAt":"2025-10-07T01:05:10.137Z","wordCount":1554}

Threat ID: 68e467476a45552f36e85bfe

Added to database: 10/7/2025, 1:05:11 AM

Last enriched: 10/7/2025, 1:13:32 AM

Last updated: 10/7/2025, 6:53:15 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats