Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Brokewell Android Malware In Fake Ads

September 1, 2025
Reading Time: 3 mins read
in Alerts
North Korea APT37 Uses RokRAT In Phishing

Cybercriminals have launched a sophisticated campaign on Meta’s advertising platforms, luring unsuspecting users with a fraudulent offer for a free TradingView Premium app for Android. This deceptive scheme, which has been active since at least July 22nd, is designed to distribute the Brokewell malware, a potent threat capable of pilfering cryptocurrency and other sensitive information. By impersonating a trusted brand and targeting mobile users, the attackers have crafted a highly effective method to compromise devices and gain a broad range of malicious capabilities. The campaign’s success is bolstered by an estimated 75 localized ads, demonstrating a concerted effort to reach a wide audience.

The attack is meticulously designed to target mobile users. Cybersecurity researchers at Bitdefender discovered that the malicious ads, which feature TradingView branding and visuals, only redirect to the malware download page when accessed from an Android device. Users on other operating systems are instead led to harmless content, a tactic that helps the attackers avoid detection and focus on their primary targets. Upon clicking the ad from an Android device, victims are taken to a fraudulent webpage that mimics the legitimate TradingView site and prompts them to download a malicious file named tw-update.apk. This careful targeting ensures that the cybercriminals maximize their efforts on the most vulnerable population.

Once the malicious application is downloaded, it employs a series of deceptive techniques to take over the device. The app first requests accessibility permissions, and after gaining approval, it displays a fake update prompt that covers the screen. In the background, the malware stealthily grants itself all the necessary permissions to operate. A particularly insidious tactic is its attempt to steal the device’s PIN by simulating an Android update request that requires the lockscreen password. These actions allow the Brokewell malware to establish a firm foothold on the device, granting it the extensive control it needs to carry out its nefarious activities without the user’s immediate knowledge.

The Brokewell malware, which has been active since early 2024, is an advanced and highly capable threat.

According to Bitdefender, this version of the malware boasts a vast arsenal of tools for monitoring, controlling, and stealing sensitive information. Its capabilities include scanning for cryptocurrency assets such as BTC, ETH, and USDT, and stealing bank account numbers (IBANs). The malware can bypass two-factor authentication (2FA) by stealing and exporting codes from Google Authenticator and can hijack accounts by overlaying fake login screens. Furthermore, it can record screens and keystrokes, steal cookies, activate the camera and microphone, track location, and intercept SMS messages, including those containing banking and 2FA codes.

The scope of the malware’s control is vast, enabling remote command and manipulation of the compromised device. Brokewell can receive commands over Tor or Websockets, allowing the attackers to remotely send texts, place calls, uninstall applications, or even self-destruct the malware itself. Bitdefender’s research provides a technical overview and an extensive list of over 130 supported commands, highlighting the malware’s comprehensive and dangerous capabilities. This campaign is reportedly part of a larger operation that initially used Facebook ads to impersonate dozens of well-known brands and target Windows users, indicating a broader and ongoing effort by these cybercriminals to exploit various platforms and victim types.

Reference:

  • Brokewell Android Malware Spread Through Fake TradingView Ads
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

Sitecore Exploit Chain Warning

High Risk SQLi In WordPress Plugin

September 2, 2025
Sitecore Exploit Chain Warning

Sitecore Exploit Chain Warning

September 2, 2025
Sitecore Exploit Chain Warning

AI Weaponized Nx Supply Chain Attack

September 2, 2025
North Korea APT37 Uses RokRAT In Phishing

North Korea APT37 Uses RokRAT In Phishing

September 1, 2025
North Korea APT37 Uses RokRAT In Phishing

New Zero Click Exploit Targets WhatsApp

September 1, 2025
Shadowcaptcha Exploits WordPress Sites

AI Systems Used for Ransomware Attacks

August 28, 2025

Latest Alerts

High Risk SQLi In WordPress Plugin

AI Weaponized Nx Supply Chain Attack

Sitecore Exploit Chain Warning

Brokewell Android Malware In Fake Ads

North Korea APT37 Uses RokRAT In Phishing

New Zero Click Exploit Targets WhatsApp

Subscribe to our newsletter

    Latest Incidents

    Lotte Card Cyberattack Reported

    Von Der Leyen Plane GPS Jamming

    Zscaler Data Breach Exposes Info

    Google Warns Salesloft Breach Hit Accounts

    Fraudster Stole Millions From Baltimore

    MathWorks Confirms Cyberattack Data Stolen

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial