Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

CISA orders removal of unsupported edge devices to reduce risk to federal networks

Combat antimicrobial resistance with McGill rapid tests

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Albiriox MaaS malware targets over 400 apps for on-device fraud and screen control
Identity

New Albiriox MaaS malware targets over 400 apps for on-device fraud and screen control

userBy userDecember 1, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A new Android malware named Albiriox is being touted as based on a malware-as-a-service (MaaS) model that offers a “full range” of features that facilitate on-device fraud (ODF), screen manipulation, and real-time interaction with infected devices.

The malware is embedded with a hardcoded list of over 400 applications spanning banking, financial technology, payment processors, cryptocurrency exchanges, digital wallets, and trading platforms.

“This malware combines a dropper application distributed through social engineering lures with packing techniques to evade static detection and deliver its payload,” said Clafy researchers Federico Valentini, Alessandro Strino, Gianluca Scotti, and Simone Mattia.

Albiriox was first advertised as part of a limited adoption phase in late September 2025, and is said to have transitioned to a MaaS service a month later. There is evidence to suggest that the threat actors speak Russian based on their activity on cybercrime forums, language patterns, and the infrastructure used.

The developer claims that prospective customers will be provided access to a custom builder that integrates with a third-party encryption service known as Golden Crypt in order to bypass antivirus and mobile security solutions.

The ultimate goal of the attack is to gain control of the mobile device and perform fraudulent activities under the radar. At least one early campaign explicitly targeted Austrian victims using German-language enticements and SMS messages containing shortened links that directed recipients to fake Google Play Store app listings for apps such as PENNY Angebote & Coupons.

Unsuspecting users who click the “Install” button on a similar page are infected with the dropper APK. Once the app is installed and launched, it asks for permission to install the app under the guise of a software update, which leads to the main malware deployment.

cyber security

Albiriox uses unencrypted TCP socket connections for command and control (C2), allowing attackers to issue various commands to remotely control devices using virtual network computing (VNC), extract sensitive information, display a black or blank screen, and increase or decrease the volume for operational stealth.

It also installs a VNC-based remote access module that allows attackers to interact with compromised phones remotely. One version of the VNC-based interaction mechanism leverages Android’s accessibility services to display all user interface and accessibility elements that are present on the device screen.

“This accessibility-based streaming mechanism is intentionally designed to circumvent the limitations imposed by Android’s FLAG_SECURE protection,” the researchers explained.

“Many banking and cryptocurrency applications currently block screen recording, screenshots, and display captures when this flag is enabled, so by leveraging accessibility services, malware can obtain a complete node-level view of the interface without triggering protections commonly associated with direct screen capture techniques.”

Like other Android-based banking Trojans, Albiriox supports overlay attacks against a hard-coded list of target applications for credential theft. Additionally, it can act as an overlay that mimics system updates or a black screen, allowing it to perform malicious activities in the background without attracting attention.

Clafy said he also observed a slightly modified distribution approach that redirected users to a fake website masquerading as PENNY. There, victims are instructed to enter their phone number to receive a download link directly via WhatsApp. This page currently only accepts Austrian phone numbers. The number you enter will be extracted to the Telegram bot.

“Albiriox exhibits all the core characteristics of modern on-device fraud (ODF) malware, including VNC-based remote control, accessibility-driven automation, targeted overlays, and dynamic credential harvesting,” said Clafy. “These capabilities allow attackers to bypass traditional authentication and fraud detection mechanisms by operating directly within a victim’s legitimate session.”

This disclosure coincides with the emergence of another Android MaaS tool, codenamed RadzaRat, that impersonates a legitimate file management utility and unlocks extensive monitoring and remote control capabilities after installation. The RAT was first advertised on underground cybercrime forums on November 8, 2025.

“The malware’s developer, operating under the alias ‘Heron44,’ positions the tool as an accessible remote access solution that requires minimal technical knowledge to deploy and operate,” said Certo researcher Sophia Taylor. “This distribution strategy reflects the issue of democratizing cybercrime tools.”

At the heart of RadzaRat is the ability to remotely adjust file system access and management, allowing cybercriminals to browse directories, search for specific files, and download data from compromised devices. It also exploits accessibility services to record users’ keystrokes and uses Telegram for C2.

cyber security

To achieve persistence, the malware uses the RECEIVE_BOOT_COMPLETED and RECEIVE_LOCKED_BOOT_COMPLETED permissions along with a dedicated BootReceiver component to ensure it launches automatically on device reboot. Additionally, it asks for the REQUEST_IGNORE_BATTERY_OPTIMIZATIONS permission to exclude itself from Android’s battery optimization features that may limit background activity.

“Its ability to masquerade as a functional file manager, combined with extensive monitoring and data extraction capabilities, makes it a significant threat to both individual users and organizations,” Certo said.

This discovery was revealed after a fake Google Play Store landing page (“com.jxtfkrsl.bjtgsb”) for an app named “GPT Trade” distributed BTMOB Android malware and a persistence module called UASecurity Miner. BTMOB was first documented by Cyble in February 2025 and is known to abuse accessibility services to unlock devices, log keystrokes, automate credential theft through injection, and enable remote control.

Social engineering lures using adult content as decoys also underpin sophisticated Android malware distribution networks that deliver highly obfuscated malicious APK files that request sensitive permissions for phishing overlays, screen captures, installation of other malware, and file system manipulation.

“We use commercial-grade obfuscation and encryption to hide separate back-end infrastructure and employ a resilient, multi-tiered architecture with front-end lure sites that connect dynamically,” said Palo Alto Networks Unit 42. “The front-end decoy site uses a series of checks, including fraudulent loading messages and the time it takes for test images to load, to evade detection and analysis.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEndpoint Permission Management – Keeper Security
Next Article Photosynthetic bacteria may help reduce PFAS contamination
user
  • Website

Related Posts

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026

CISA orders removal of unsupported edge devices to reduce risk to federal networks

February 6, 2026

Asian State Assistance Group TGR-STA-1030 breaches 70 governments and infrastructure-related organizations

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

CISA orders removal of unsupported edge devices to reduce risk to federal networks

Combat antimicrobial resistance with McGill rapid tests

Asian State Assistance Group TGR-STA-1030 breaches 70 governments and infrastructure-related organizations

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.