Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Protect our present, protect our future

CISO’s expert guide to AI supply chain attacks

Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram into Hacker Hub

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram into Hacker Hub
Identity

Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram into Hacker Hub

userBy userNovember 11, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have revealed details of a new Android remote access Trojan (RAT) called Fantasy Hub that is marketed on Russian-speaking Telegram channels based on a Malware-as-a-Service (MaaS) model.

According to the seller, the malware allows control and espionage of the device, allowing attackers to collect SMS messages, contacts, call logs, images, and videos, as well as intercept, reply to, and delete incoming notifications.

“This is a MaaS product with seller documentation, videos, and a bot-driven subscription model that lowers the barrier to entry and helps novice attackers,” Zimperium researcher Vishnu Pratapagiri said in a report last week.

“Because it targets financial workflows (fake bank tellers) and abuses the role of SMS handlers (to intercept two-factor SMS), it poses a direct threat to enterprise customers using BYOD and organizations whose employees rely on mobile banking or sensitive mobile apps.”

The threat actor refers to his victims as “mammoths” in Fantasy Hub ads. This is a term often used by Telegram-based cybercriminals operating outside of Russia.

Electronic Crime Solutions customers will receive instructions on creating a fake Google Play Store landing page for distribution and steps to circumvent the restrictions. Potential buyers can choose the icon, name, and page appearance they want.

DFIR retainer service

The bot, which manages paid subscriptions and access to builders, is designed to allow threat actors to upload arbitrary APK files to the service and return a trojanized version with a malicious payload. This service is available for $200 per week or $500 per month for one user (i.e., one active session). Users can also choose an annual subscription for $4,500.

The command and control (C2) panel associated with the malware displays details about the compromised device, as well as information about the subscription status itself. This panel also provides the attacker with the ability to issue commands to collect various types of data.

“The seller instructs the buyer to create a bot, obtain a chat ID, and configure a token that routes general and high-priority alerts to different chats,” Zimperium said. “This design closely mirrors HyperRat, the Android RAT detailed last month.”

This malware, like ClayRAT, abuses default SMS permissions to gain access to SMS messages, contacts, camera, and files. By asking users to set this as their default SMS processing app, malicious programs can gain multiple powerful permissions at once instead of requesting individual permissions at runtime.

Dropper apps have been found to disguise their legitimacy by masquerading as Google Play updates to trick users into granting the necessary permissions. In addition to using fake overlays to obtain bank credentials related to Russian financial institutions such as Alfa, PSB, T-Bank, and Sberbank, the spyware relies on open source projects to stream camera and microphone content in real-time via WebRTC.

“The rapid rise of Malware-as-a-Service (MaaS) operations like Fantasy Hub shows how easily attackers can weaponize legitimate Android components and compromise entire devices,” Pratapagiri said. “Unlike older banking Trojans that rely solely on overlays, Fantasy Hub integrates native droppers, WebRTC-based live streaming, and SMS handler role exploitation to steal data and impersonate legitimate apps in real-time.”

The disclosure comes after Zscaler ThreatLabz revealed that sophisticated spyware and banking trojans led to a 67% year-over-year increase in Android malware transactions. As many as 239 malicious applications were reported in the Google Play Store, and these applications were downloaded a total of 42 million times between June 2024 and May 2025.

Notable Android malware families observed during this period included Anatsa (also known as TeaBot and Toddler), Void (also known as Vo1d), and an unprecedented Android RAT called Xnotice that targeted job seekers in the oil and gas sector in the Middle East and North Africa region under the guise of job search apps distributed via fake employment portals.

Once installed, the malware steals banking credentials through an overlay and collects other sensitive data such as multi-factor authentication (MFA) codes, SMS messages, and screenshots.

CIS build kit

“Threat actors often deploy sophisticated banking Trojans, such as Anatsa, ERMAC, and TrickMo, in both official and third-party app stores disguised as legitimate utilities and productivity apps,” the company said. “Once installed, they use highly deceptive techniques to capture usernames, passwords, and even two-factor authentication (2FA) codes needed to authorize transactions.”

This finding also follows CERT Polska’s advisory regarding a new sample of Android malware called NGate (also known as NFSkate) that targets users of Polish banks and steals card information via near-field communication (NFC) relay attacks. Links to malicious apps are distributed through phishing emails and SMS messages purporting to come from banks, warning recipients about technical issues or security incidents, and enticing them to install the app.

Upon launching the affected app, victims are asked to confirm their payment card directly within the app by tapping the payment card on the back of their Android device. However, by doing this, the app secretly captures the card’s NFC data and leaks it either to an attacker-controlled server or directly to a companion app installed by the attacker who wants to withdraw cash from the ATM.

“This campaign aims to allow victims to fraudulently withdraw cash from ATMs using their own payment cards,” the agency said. “Rather than physically stealing the card, the criminal relays the card’s NFC traffic from the victim’s Android phone to a device the attacker controls at the ATM.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSweden invests SEK 95 million to lead the green technology race
Next Article CISO’s expert guide to AI supply chain attacks
user
  • Website

Related Posts

CISO’s expert guide to AI supply chain attacks

November 11, 2025

Hackers exploit Triofox flaw to install remote access tools via antivirus

November 10, 2025

Konni hacker turns Google’s Find Hub into remote data erasure weapon

November 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Protect our present, protect our future

CISO’s expert guide to AI supply chain attacks

Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram into Hacker Hub

Sweden invests SEK 95 million to lead the green technology race

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.