Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New Perseus Android banking malware monitors Notes app and extracts sensitive data

UK and Ukraine officially sign civil space cooperation

Live Science Today: Artemis II prepares to deploy as northern lights light the sky

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Perseus Android banking malware monitors Notes app and extracts sensitive data
Identity

New Perseus Android banking malware monitors Notes app and extracts sensitive data

By March 19, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 19, 2026Malware/Mobile Security

Perseus Android Banking Malware

Cybersecurity researchers have uncovered a new Android malware family called Perseus that is actively distributed for device takeover (DTO) and financial fraud.

Perseus builds on the foundations of Cerberus and Phoenix while evolving into a “more flexible and capable platform” for compromising Android devices through dropper apps distributed via phishing sites.

“Through accessibility-based remote sessions, this malware enables real-time monitoring and precise interaction with infected devices, allowing for entire device hijacking and targeting various regions with a focus on Turkey and Italy,” ThreatFabric said in a report shared with The Hacker News.

“Beyond traditional credential theft, we see Perseus monitoring users’ notes and focusing on extracting high-value personal and financial information.”

Cerberus was first documented by a Dutch mobile security company in August 2019, highlighting that the malware exploits Android’s accessibility services to grant itself additional privileges and provide fake overlay screens to steal sensitive data and credentials. After the source code was leaked in 2020, multiple variants emerged including Alien, ERMAC, and Phoenix.

Some of the artifacts distributed by Perseus are listed below.

Roja App Directa (com.xcvuc.ocnsxn) – Dropper TvTApp (com.tvtapps.live) – Perseus payload PolBox Tv (com.streamview.players) – Perseus payload

ThreatFabric’s analysis found that the malware extends the Phoenix codebase, and the attackers likely rely on large-scale language models (LLMs) to aid development. This is based on indicators such as extensive in-app logs and the presence of emojis in the source code.

Similar to the recently released Massiv Android malware, Perseus disguises itself as an IPTV service and targets users looking to sideload such apps onto their devices in order to watch premium content. This malware distribution campaign primarily targets Turkey, Italy, Poland, Germany, France, UAE, and Portugal.

“By embedding its payload within this expected context, the Perseus malware effectively reduces user suspicion, increases infection success rates, and blends its malicious activity with the commonly accepted distribution model for such services,” ThreatFabric said.

Once deployed, Perseus functions no different from other Android banking malware in that it launches overlay attacks, captures keystrokes and intercepts user input in real-time, and displays fake interfaces on financial apps and cryptocurrency services to steal credentials.

The malware also allows operators to remotely issue commands through a command and control (C2) panel to execute and authorize fraudulent transactions. Some of the supported commands are:

scan_notes captures content from various note-taking apps such as Google Keep, Xiaomi Notes, Samsung Notes, ColorNote Notepad Notes, Evernote, Simple Notes Pro, Simple Notes, Microsoft OneNote (specifies the incorrect package name “com.microsoft.onenote” instead of “com.microsoft.office.onenote”). start_vnc, launches a near real-time visual stream of the victim’s screen. stop_vnc, stops a remote session. start_hvnc sends a structured representation of the UI hierarchy and allows threat actors to programmatically interact with UI elements. stop_hvnc, stops a remote session. Enable_accessibility_screenshot, Enables taking screenshots using accessibility services. disable_accessibility_screenshot, disables taking screenshots using accessibility services. unblock_app, removes an application from the block list. clear_blocked, clears the entire list of blocked applications. action_blackscreen displays a black screen overlay to hide device activity from the user. nighty, mute the audio. click_coord, performs a tap at specific screen coordinates. install_from_unknown, forces installation from unknown sources. start_app, starts the specified application.

Perseus performs a wide range of environmental checks to detect the presence of debuggers and analysis tools such as Frida and Xused, as well as check if a SIM card is inserted, check how many apps are installed and if they are unusually low, and verify battery values ​​to ensure they are running on a real device.

The malware then combines all this information to create an overall suspicion score and sends it to the C2 panel to determine the next course of action and whether the operator should continue with the data theft.

“Perseus highlights the continued evolution of Android malware, showing how modern threats are building on established families like Cerberus and Phoenix while introducing targeted improvements rather than completely new paradigms,” ThreatFabric said.

“While its capabilities range from accessibility-based remote control and overlay attacks to note monitoring, it is clearly focused on maximizing both the interaction with the device and the value of the data collected. This balance between inherited functionality and selective innovation reflects a broader trend toward efficiency and adaptability in malware development.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUK and Ukraine officially sign civil space cooperation

Related Posts

How Ceros gives security teams visibility and control over their code

March 19, 2026

DarkSword iOS exploit kit uses 6 flaws, 3 zero-days to take over entire device

March 19, 2026

Warning of CISA, Zimbra, SharePoint flaw exploitation. Cisco’s zero-day hit in ransomware attacks

March 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New Perseus Android banking malware monitors Notes app and extracts sensitive data

UK and Ukraine officially sign civil space cooperation

Live Science Today: Artemis II prepares to deploy as northern lights light the sky

How Ceros gives security teams visibility and control over their code

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.