Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Fakes Android Antivirus Has Malware

August 25, 2025
Reading Time: 3 mins read
in Alerts
Fake Go SSH Tool Steals Credentials

A new and sophisticated Android malware is being used to conduct targeted attacks against Russian business executives. According to a report by the Russian mobile security firm Dr. Web, the spyware, which they have named ‘Android.Backdoor.916.origin,’ is being distributed under the guise of an antivirus tool. Its deceptive branding, which includes names like “SECURITY_FSB” and “ФСБ,” is designed to impersonate software from Russia’s Federal Security Service (FSB) or “GuardCB” to impersonate the Central Bank of the Russian Federation. The researchers believe the malware’s focus on Russian language and its specific lures indicate it is intended for a very specific group of victims.

Upon installation, the malicious application requests an extensive list of high-risk permissions.

This includes access to geo-location data, SMS messages, media files, and the camera and microphone. It also seeks permission to access the Accessibility Service and run in the background, ensuring it can operate undetected at all times. The app’s fake antivirus interface even attempts to mimic a genuine security scan, displaying a simulation that randomly returns a fake positive result to trick the user into believing the software is working, thus deterring them from uninstalling it.

The ‘Android.Backdoor.916.origin’ malware is a multi-functional backdoor with an alarming array of espionage capabilities.

Once installed, it connects to a command and control (C2) server to receive instructions from the attackers. These commands enable the malware to exfiltrate a wide range of sensitive data, including contacts, call history, geo-location, and stored images. It also has the ability to activate the device’s microphone and camera for live streaming, capture text input with a keylogger, and steal content directly from popular messaging apps and browsers like Telegram, WhatsApp, Gmail, Chrome, and Yandex apps.

Dr. Web’s researchers have been tracking the malware’s evolution since its initial discovery in January 2025 and have already identified multiple subsequent versions. This indicates that the malware is under continuous development, with its creators actively working to improve its capabilities. The researchers also found that the malware is designed for resilience, with the ability to switch between up to 15 different hosting providers, a feature that, while currently inactive, suggests a plan for maintaining persistence even if some C2 servers are taken down.

The sophistication and targeted nature of this malware highlight a growing threat to corporate security. By posing as a legitimate security tool from a trusted government agency, the attackers are exploiting a common need for security solutions while simultaneously gaining comprehensive access to their victims’ devices. This incident serves as a stark reminder of the importance of vigilance when downloading applications, even those that appear to be from credible sources, and the necessity of robust mobile security measures, particularly for high-profile targets within a business environment.

Reference:

  • New Android Malware Disguises as Antivirus Linked to Russian Intelligence Agency
Tags: August 2025Cyber AlertsCyber Alerts 2025CyberattackCybersecurity
ADVERTISEMENT

Related Posts

Apple Warns Users As CERT-FR Confirms

Former Feds Targeted By Chinese Jobs

September 12, 2025
Apple Warns Users As CERT-FR Confirms

CHILLYHELL And ZynorRAT Threaten Systems

September 12, 2025
Apple Warns Users As CERT-FR Confirms

Apple Warns Users As CERT-FR Confirms

September 12, 2025
SAP Patches Critical NetWeaver Flaw

EggStreme Malware Hits Philippine Military

September 11, 2025
SAP Patches Critical NetWeaver Flaw

RatOn Malware Hits Android Banking

September 11, 2025
SAP Patches Critical NetWeaver Flaw

SAP Patches Critical NetWeaver Flaw

September 11, 2025

Latest Alerts

Former Feds Targeted By Chinese Jobs

CHILLYHELL And ZynorRAT Threaten Systems

Apple Warns Users As CERT-FR Confirms

RatOn Malware Hits Android Banking

EggStreme Malware Hits Philippine Military

SAP Patches Critical NetWeaver Flaw

Subscribe to our newsletter

    Latest Incidents

    Panama Economy Ministry Reports Breach

    LNER Warns Customers Of Data Breach

    Hello Gym Leak Exposes Member Audio

    DDoS Defender Hit by Massive Attack

    Vienna VA Reports Data Breach Leak

    GitHub Hack Triggers Salesloft Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial