Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

"Sneaky" new Android malware takes over your phone, hiding in fake news and ID apps

0
Medium
Published: Wed Nov 05 2025 (11/05/2025, 12:36:23 UTC)
Source: AlienVault OTX General

Description

A new Android Trojan masquerades as legitimate news reader or digital ID apps, stealthily stealing sensitive data by exploiting Android Accessibility Services and overlay features. It primarily targets banking and cryptocurrency applications by overlaying fake login screens to capture credentials. The malware operates silently in the background, connects to a remote command center for updates and cleanup, and has been observed mainly in Southeast Asia. Although no CVE or known exploits in the wild are reported, the malware's capabilities pose significant risks to user confidentiality and financial security. This threat highlights the importance of enhanced mobile security and user vigilance against fake apps and overlay attacks.

AI-Powered Analysis

AILast updated: 11/05/2025, 21:39:28 UTC

Technical Analysis

This sophisticated Android Trojan disguises itself as trusted applications such as news readers or digital ID apps to trick users into installation. Once active, it leverages Android's Accessibility Services and overlay capabilities to gain extensive control over the device. Accessibility Services allow the malware to monitor and interact with other apps, while overlay features enable it to display fake login screens on top of legitimate banking and cryptocurrency apps. By doing so, it captures user credentials and financial information without raising suspicion. The malware runs covertly in the background, minimizing user detection, and communicates with a remote command and control (C2) server to receive updates, new commands, and to erase evidence of its presence. Although primarily reported in Southeast Asia, the malware's techniques are broadly applicable to Android devices globally. The campaign does not currently have a CVE or documented exploits in the wild, but its use of advanced Android features and targeting of high-value financial apps makes it a significant threat. The hashes provided can be used for detection and blocking. This Trojan exemplifies the growing trend of mobile malware exploiting legitimate OS features to bypass traditional security controls and emphasizes the need for robust mobile threat defense strategies.

Potential Impact

For European organizations, the impact of this malware could be substantial, especially for employees using Android devices for corporate banking, cryptocurrency transactions, or accessing sensitive digital ID services. The theft of login credentials and financial data can lead to direct financial losses, unauthorized transactions, and identity theft. If corporate credentials are compromised, attackers could gain access to internal systems or financial accounts, potentially leading to broader organizational breaches. Overlay attacks can also undermine user trust in mobile applications and digital services. Although the malware is currently focused on Southeast Asia, the techniques used could be adapted to target European users, especially in countries with high Android adoption and significant use of mobile banking and cryptocurrency services. The malware’s ability to update itself and erase traces complicates incident response and forensic investigations. Additionally, the exploitation of Accessibility Services may bypass some traditional mobile security controls, increasing the risk of undetected compromise.

Mitigation Recommendations

European organizations should implement a multi-layered mobile security approach beyond generic advice. First, enforce strict application vetting policies, allowing installation only from trusted sources such as the official Google Play Store and verified enterprise app stores. Employ Mobile Threat Defense (MTD) solutions capable of detecting malicious use of Accessibility Services and overlay attacks. Regularly update Android devices and apps to benefit from security patches and improvements. Educate employees on the risks of installing apps from unknown sources and recognizing suspicious app behavior, especially those requesting Accessibility permissions. Implement strong multi-factor authentication (MFA) for banking and corporate applications to reduce the impact of credential theft. Monitor network traffic for unusual connections to known malicious command and control servers, using the provided malware hashes for threat intelligence integration. Finally, consider restricting the use of Accessibility Services to only essential apps and monitor their usage through mobile device management (MDM) solutions to detect anomalies.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.malwarebytes.com/blog/news/2025/11/sneaky-new-android-malware-takes-over-your-phone-hiding-in-fake-news-and-id-apps"]
Adversary
null
Pulse Id
690b44c702073b45e11e8005
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash4e26d7dcf6052b6ad0dd2006eef3f7bc
hashdc7a2f60b55a7ce780be30ef815ef85d
hash3d1e9780c206bccd77aef429c0ace00b559466fa
hashe474e9fe5c37a272d9e6ba88f8957f6a72fe6f1b
hash19456fbe07ae3d5dc4a493bac27921b02fc75eaa02009a27ab1c6f52d0627423
hasha4126a8863d4ff43f4178119336fa25c0c092d56c46c633dc73e7fc00b4d0a07
hashcb25b1664a856f0c3e71a318f3e35eef8b331e047acaf8c53320439c3c23ef7c

Threat ID: 690bc2866ab8174a0d402f4c

Added to database: 11/5/2025, 9:32:54 PM

Last enriched: 11/5/2025, 9:39:28 PM

Last updated: 11/6/2025, 7:58:18 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats