Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

When your IPTV app terminates your savings

0
Medium
Published: Thu Feb 19 2026 (02/19/2026, 11:04:35 UTC)
Source: AlienVault OTX General

Description

A new Android banking Trojan named Massiv has been discovered, posing a significant threat to mobile banking users. This malware allows remote control of infected devices and enables Device Takeover attacks, leading to fraudulent transactions from victims' accounts. Massiv is distributed through side-loading, often masquerading as IPTV applications. It features overlay functionality, keylogging, and SMS/Push message interception to steal sensitive data. The malware has targeted government applications and digital identity wallets, particularly in Portugal. Massiv supports screen streaming and UI-tree modes for remote control, bypassing screen capture protections. The trend of malware masquerading as IPTV apps is increasing, exploiting users' willingness to install from unofficial sources.

AI-Powered Analysis

AILast updated: 02/19/2026, 13:06:24 UTC

Technical Analysis

Massiv is an Android banking Trojan that has been identified as a significant threat to mobile banking users. It is primarily distributed through side-loading, often disguised as IPTV applications, which are popular but frequently installed from unofficial sources. Once installed, Massiv gains extensive control over the infected device, enabling remote control and device takeover attacks. It uses overlay functionality to display fake screens over legitimate banking or government apps, tricking users into entering sensitive credentials. Additionally, it logs keystrokes and intercepts SMS and push notifications to capture authentication codes and other sensitive information. Massiv targets high-value applications, including government apps and digital identity wallets, with confirmed activity in Portugal. The malware supports screen streaming and UI-tree modes, allowing attackers to remotely navigate the device interface and bypass Android's screen capture protections, enhancing stealth and control. This combination of features allows attackers to perform fraudulent transactions and steal personal data effectively. The trend of malware masquerading as IPTV apps is increasing, exploiting users' trust and willingness to install apps outside official app stores. Although no known exploits in the wild have been reported, the technical sophistication and targeted nature of Massiv make it a noteworthy threat in the mobile banking malware landscape.

Potential Impact

The Massiv Trojan poses a substantial risk to organizations and individuals relying on mobile banking and digital identity applications. Its ability to remotely control infected devices and perform device takeover attacks can lead to unauthorized financial transactions, resulting in direct monetary losses for victims. The interception of SMS and push notifications compromises multi-factor authentication mechanisms, weakening security controls. Targeting government applications and digital identity wallets threatens the integrity and confidentiality of sensitive personal and governmental data, potentially undermining trust in digital services. The malware's evasion techniques, such as overlay attacks and bypassing screen capture protections, make detection and mitigation challenging, increasing the likelihood of successful attacks. Organizations may face reputational damage, regulatory penalties, and increased operational costs due to fraud remediation. The distribution method via side-loading and IPTV app masquerading exploits user behavior, potentially increasing infection rates in regions where IPTV apps are popular and side-loading is common. Overall, Massiv can disrupt financial operations, compromise user privacy, and degrade confidence in mobile banking platforms.

Mitigation Recommendations

To mitigate the threat posed by Massiv, organizations and users should implement a multi-layered mobile security strategy. First, enforce strict policies prohibiting side-loading of applications on corporate and personal devices used for sensitive transactions. Utilize Mobile Device Management (MDM) solutions to control app installation sources and monitor device integrity. Employ advanced mobile threat defense (MTD) tools capable of detecting overlay attacks, keylogging behavior, and unauthorized accessibility service usage. Educate users about the risks of installing IPTV or other unofficial apps and encourage downloading only from trusted app stores. Implement behavioral analytics to detect anomalous device activity indicative of remote control or screen streaming. Strengthen multi-factor authentication by using methods less susceptible to interception, such as hardware tokens or biometric factors. Regularly update and patch mobile operating systems and applications to reduce vulnerabilities. For organizations, monitor transaction patterns for signs of fraud and establish rapid incident response protocols for suspected device compromise. Finally, collaborate with threat intelligence providers to stay informed about emerging variants and indicators of compromise related to Massiv.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.threatfabric.com/blogs/massiv-when-your-iptv-app-terminates-your-savings"]
Adversary
null
Pulse Id
6996ee4320c952e1066ff964
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash68299b87c2dd7178c1d9096f4c8da77c
hash742bd30969e47f290c4081c2c1e58386
hash9bfe0d5e97d5fbe526ca43e62acb91bdc833526d
hashda372ed626ba7bfe4ae22c988daabfa403ecce93
hash54d4cb45fb7a18780ff2ccc7314b9b51ae446c58a179abbf9e62ce0c28539e8e
hashf9a52a923989353deb55136830070554db40f544be5a43534273126060f8c1f6

Threat ID: 69970717b557332a80d468c3

Added to database: 2/19/2026, 12:50:31 PM

Last enriched: 2/19/2026, 1:06:24 PM

Last updated: 2/19/2026, 10:34:00 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats