Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

[contact-form-7 id="dd1f6aa" title="Newsletter"]
What's Hot

Testing Proxmox 9 Snapshots as Volume Chains on iSCSI (Tech Preview)

August 13, 2025

Z-Wave reborn – Home Assistant Connect ZWA-2

August 13, 2025

Awesome List Updates on May 17, 2025

August 13, 2025
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
Cyber Security

New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft

MichaBy MichaJune 21, 2025No Comments4 Mins Read
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft


Introduction

Cybersecurity threats continue to evolve, with various new malware strains targeting Android devices. Among the most notorious is AntiDot, a versatile malware that has compromised thousands of devices through cunning tactics. Recent analyses reveal its sophisticated methods, revealing the dangers that lurk within seemingly innocent applications. Read on to explore AntiDot’s capabilities, recent developments in malware, and essential tips for safeguarding your devices.

Understanding the AntiDot Malware

Cybersecurity researchers have uncovered the intricate workings of AntiDot, a potent Android malware that has infiltrated more than 3,775 devices through 273 campaigns. Operated by the financially motivated group LARVA-398, AntiDot is marketed as a Malware-as-a-Service (MaaS) in underground forums, demonstrating the alarming trend in mobile cybersecurity.

Advanced Features of AntiDot

AntiDot is advertised as a “three-in-one” solution, capable of performing various illicit activities including recording the device screen, intercepting SMS messages, and extracting sensitive data from third-party applications. This Android trojan is often delivered via malicious advertising networks or highly tailored phishing campaigns that target victims based on their language and geographic location.

Initially documented in May 2024, AntiDot was spotted distributing malware by masquerading as Google Play updates. Its advanced features include conducting overlay attacks, logging keystrokes, and remotely controlling infected devices using Android’s MediaProjection API. A notable aspect is its real-time bi-directional communication facilitated through WebSocket, enabling live exchanges between the infected device and external servers.

Distribution and Infection Tactics

Recent reports indicate that over 11 active command-and-control (C2) servers oversee the infected devices, underscoring the malware’s broad reach. AntiDot is heavily obfuscated, employing commercial packers to evade detection. The infection begins with an APK file that cleverly loads malicious code during installation, making detection significantly more challenging for antivirus tools.

To carry out its schemes, AntiDot creates a deceptive update bar to trick users into granting accessibility permissions. Once access is achieved, the malware can effectively monitor device activity, including screen content and SMS messages.

Notable Recent Examples

In December 2024, Zimperium illustrated the evolution of AntiDot with an updated variant known as AppLite Banker. This new version leveraged job offer-themed decoys in a mobile phishing campaign, demonstrating the malware’s adaptability and the ongoing threat it poses to mobile security.

Emergence of GodFather Malware

In recent developments, Zimperium’s zLabs discovered a significant evolution of the GodFather Android banking trojan. This new variant utilizes on-device virtualization to hijack legitimate mobile banking and cryptocurrency applications for committing real-time fraud.

Virtual Environment Techniques

GodFather employs a malicious ‘host’ application that creates a sandboxed environment on the victim’s device. This framework allows it to download and run targeted banking apps within this isolated setting, intercepting victim actions for nefarious purposes.

Researchers have noted that similar virtualization tactics were earlier identified in the FjordPhantom malware. This evolution signifies a major shift in mobile threats, expanding beyond conventional overlay strategies.

New Threats: SuperCard X Malware

The cybersecurity landscape continues to be threatened by new players like the SuperCard X malware, primarily targeting Russian users. This malware conducts near-field communication (NFC) relay attacks and exploits legitimate tools for data theft.

Implementation and Targeting

SuperCard X captures NFC traffic from bank cards, enabling attackers to execute fraudulent transactions. Initially detected in Italy, its capabilities highlight the dangers of NFC technology when combined with mobile malware.

Malicious Apps in Official Play Stores

Recent research has uncovered malicious Applications in both the Google Play Store and Apple’s App Store designed to harvest personal information and compromise cryptocurrency wallets. A notable example is RapiPlata, which disguised itself as a loan application but ultimately engaged in extensive data theft.

Protecting Yourself from Mobile Threats

As cybercriminals increasingly exploit legitimate platforms, users must remain vigilant. Always download apps from trusted sources and scrutinize permissions before installation.

### Unique Tip
Consider using mobile security applications that provide real-time threat detection and regular updates. These tools can help safeguard against malicious attempts, especially if you frequently download financial applications.

FAQs

Question 1: What should I do if I suspect my device is infected with malware?
Answer: Immediately disconnect from the internet, enable safe mode, and run a reputable antivirus scan. If the infection persists, consider performing a factory reset after backing up important data.

Question 2: How can I identify phishing attempts on mobile devices?
Answer: Look for suspicious links, unsolicited messages, and requests for personal information. Always verify the sender’s identity before clicking on links.

Question 3: What are the signs that an app may be malicious?
Answer: Watch for applications that request excessive permissions, behave strangely, or have poor ratings and reviews, especially if they promise unrealistic features or returns.

Found this article insightful? Follow us on Twitter and LinkedIn for more exclusive cybersecurity content.



Read the original article

0 Like this
Android devices Fraud hits malware NFC Overlays Surge Theft Virtualization
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleUC Berkeley Introduces CyberGym: A Real-World Cybersecurity Evaluation Framework to Evaluate AI Agents on Large-Scale Vulnerabilities Across Massive Codebases
Next Article This Universal Small Part Holder Is an Amazing Little Gadget

Related Posts

Gadgets

Your Sony TV Might Be Next To Get Android 14

August 13, 2025
Cyber Security

Teenage Hacker Stole $243M In Bitcoin. How It Happened.

August 12, 2025
Cyber Security

How to restore GPT-4o when you’ve GPT-5

August 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.