Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    The AI Hype Index: AI-powered toys are coming

    June 27, 2025

    How to Schedule Incremental Backups Using rsync and cron

    June 27, 2025

    Hacker ‘IntelBroker’ charged in US for global data theft breaches

    June 27, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
    Cyber Security

    New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft

    MichaBy MichaJune 21, 2025No Comments4 Mins Read
    New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft


    Introduction

    Cybersecurity threats continue to evolve, with various new malware strains targeting Android devices. Among the most notorious is AntiDot, a versatile malware that has compromised thousands of devices through cunning tactics. Recent analyses reveal its sophisticated methods, revealing the dangers that lurk within seemingly innocent applications. Read on to explore AntiDot’s capabilities, recent developments in malware, and essential tips for safeguarding your devices.

    Understanding the AntiDot Malware

    Cybersecurity researchers have uncovered the intricate workings of AntiDot, a potent Android malware that has infiltrated more than 3,775 devices through 273 campaigns. Operated by the financially motivated group LARVA-398, AntiDot is marketed as a Malware-as-a-Service (MaaS) in underground forums, demonstrating the alarming trend in mobile cybersecurity.

    Advanced Features of AntiDot

    AntiDot is advertised as a “three-in-one” solution, capable of performing various illicit activities including recording the device screen, intercepting SMS messages, and extracting sensitive data from third-party applications. This Android trojan is often delivered via malicious advertising networks or highly tailored phishing campaigns that target victims based on their language and geographic location.

    Initially documented in May 2024, AntiDot was spotted distributing malware by masquerading as Google Play updates. Its advanced features include conducting overlay attacks, logging keystrokes, and remotely controlling infected devices using Android’s MediaProjection API. A notable aspect is its real-time bi-directional communication facilitated through WebSocket, enabling live exchanges between the infected device and external servers.

    Distribution and Infection Tactics

    Recent reports indicate that over 11 active command-and-control (C2) servers oversee the infected devices, underscoring the malware’s broad reach. AntiDot is heavily obfuscated, employing commercial packers to evade detection. The infection begins with an APK file that cleverly loads malicious code during installation, making detection significantly more challenging for antivirus tools.

    To carry out its schemes, AntiDot creates a deceptive update bar to trick users into granting accessibility permissions. Once access is achieved, the malware can effectively monitor device activity, including screen content and SMS messages.

    Notable Recent Examples

    In December 2024, Zimperium illustrated the evolution of AntiDot with an updated variant known as AppLite Banker. This new version leveraged job offer-themed decoys in a mobile phishing campaign, demonstrating the malware’s adaptability and the ongoing threat it poses to mobile security.

    Emergence of GodFather Malware

    In recent developments, Zimperium’s zLabs discovered a significant evolution of the GodFather Android banking trojan. This new variant utilizes on-device virtualization to hijack legitimate mobile banking and cryptocurrency applications for committing real-time fraud.

    Virtual Environment Techniques

    GodFather employs a malicious ‘host’ application that creates a sandboxed environment on the victim’s device. This framework allows it to download and run targeted banking apps within this isolated setting, intercepting victim actions for nefarious purposes.

    Researchers have noted that similar virtualization tactics were earlier identified in the FjordPhantom malware. This evolution signifies a major shift in mobile threats, expanding beyond conventional overlay strategies.

    New Threats: SuperCard X Malware

    The cybersecurity landscape continues to be threatened by new players like the SuperCard X malware, primarily targeting Russian users. This malware conducts near-field communication (NFC) relay attacks and exploits legitimate tools for data theft.

    Implementation and Targeting

    SuperCard X captures NFC traffic from bank cards, enabling attackers to execute fraudulent transactions. Initially detected in Italy, its capabilities highlight the dangers of NFC technology when combined with mobile malware.

    Malicious Apps in Official Play Stores

    Recent research has uncovered malicious Applications in both the Google Play Store and Apple’s App Store designed to harvest personal information and compromise cryptocurrency wallets. A notable example is RapiPlata, which disguised itself as a loan application but ultimately engaged in extensive data theft.

    Protecting Yourself from Mobile Threats

    As cybercriminals increasingly exploit legitimate platforms, users must remain vigilant. Always download apps from trusted sources and scrutinize permissions before installation.

    ### Unique Tip
    Consider using mobile security applications that provide real-time threat detection and regular updates. These tools can help safeguard against malicious attempts, especially if you frequently download financial applications.

    FAQs

    Question 1: What should I do if I suspect my device is infected with malware?
    Answer: Immediately disconnect from the internet, enable safe mode, and run a reputable antivirus scan. If the infection persists, consider performing a factory reset after backing up important data.

    Question 2: How can I identify phishing attempts on mobile devices?
    Answer: Look for suspicious links, unsolicited messages, and requests for personal information. Always verify the sender’s identity before clicking on links.

    Question 3: What are the signs that an app may be malicious?
    Answer: Watch for applications that request excessive permissions, behave strangely, or have poor ratings and reviews, especially if they promise unrealistic features or returns.

    Found this article insightful? Follow us on Twitter and LinkedIn for more exclusive cybersecurity content.



    Read the original article

    0 Like this
    Android devices Fraud hits malware NFC Overlays Surge Theft Virtualization
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleUC Berkeley Introduces CyberGym: A Real-World Cybersecurity Evaluation Framework to Evaluate AI Agents on Large-Scale Vulnerabilities Across Massive Codebases
    Next Article This Universal Small Part Holder Is an Amazing Little Gadget

    Related Posts

    Cyber Security

    Hacker ‘IntelBroker’ charged in US for global data theft breaches

    June 27, 2025
    Cyber Security

    Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options

    June 27, 2025
    Cyber Security

    A Future World Of AI-Driven Network Security Solutions

    June 25, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.