Skip to main content
Mallory

Emergence of Advanced Android Malware Targeting App Stores and Banking Credentials

credential-stealer-activitycybercrime-service-ecosystemfinancial-sector-threatremote-access-implantphishing-campaign-intelligence
Updated March 21, 2026 at 03:06 PM3 sources
Share:
Emergence of Advanced Android Malware Targeting App Stores and Banking Credentials

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

A new wave of Android malware is leveraging sophisticated techniques to evade detection and compromise user devices. The Cellik malware-as-a-service (MaaS) platform enables cybercriminals to create trojanized versions of legitimate Google Play Store apps, embedding malicious payloads while preserving the original app's interface and functionality. This approach allows attackers to bypass security controls such as Play Protect and remain undetected for extended periods. Cellik offers features including real-time screen streaming, notification interception, filesystem browsing, data exfiltration, and a hidden browser mode for session hijacking, all managed through an encrypted command-and-control channel.

In parallel, other Android malware campaigns such as NexusRoute and FvncBot are targeting users by impersonating trusted government and banking applications. NexusRoute focuses on Indian citizens by distributing fake mParivahan and e-Challan apps through phishing sites and GitHub repositories, enabling credential theft, device surveillance, and unauthorized financial transactions. FvncBot, meanwhile, disguises itself as a banking-security app and exploits accessibility and VNC features to capture keystrokes, stream screens, and inject fraudulent transactions within genuine banking apps. These developments highlight the increasing sophistication and commercial availability of Android malware, posing significant risks to mobile users and financial institutions alike.

Timeline

  1. Dec 16, 2025

    iVerify uncovers Cellik Android malware-as-a-service

    Security firm iVerify reported on Cellik, a new Android malware-as-a-service sold on underground forums that creates trojanized versions of legitimate Google Play apps. The platform supports screen capture, notification interception, file theft, data wiping, hidden browser activity, and credential-stealing app injection, with claims of bypassing Google Play Protect.

  2. Dec 15, 2025

    Researchers discover FvncBot Android banking trojan

    Researchers disclosed a new Android banking trojan named FvncBot that masquerades as a banking-security application. The malware abuses accessibility and VNC capabilities to capture keystrokes, stream screens, and perform fraudulent transactions from infected devices while operating inside legitimate banking apps.

  3. Dec 15, 2025

    Cyfirma identifies NexusRoute Android malware campaign targeting India

    Cyfirma analysts identified a sophisticated Android malware campaign dubbed NexusRoute that impersonates Indian government services such as mParivahan and e-Challan. The operation uses phishing sites and fake apps distributed via GitHub to steal credentials, banking data, OTPs, and enable surveillance features including GPS tracking, microphone access, and screen capture.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Android Malware Campaigns Targeting Indian Users and Banking Apps

Android Malware Campaigns Targeting Indian Users and Banking Apps

Researchers have identified new Android malware campaigns targeting users in India, with a focus on financial fraud and surveillance. The NexusRoute remote access trojan (RAT) was discovered impersonating the Indian e-Challan app and leveraging GitHub for distribution, enabling attackers to conduct UPI fraud and monitor victims' activities. In a separate but related campaign, the FvncBot Android banking trojan masquerades as a legitimate banking-security application, exploiting accessibility and VNC features to capture keystrokes, stream device screens, and inject fraudulent transactions directly from compromised devices. Both malware strains are notable for their ability to operate within genuine banking apps, allowing them to bypass traditional security checks and evade detection. These campaigns highlight the increasing sophistication of mobile threats in India, particularly those targeting financial transactions and personal data. Security experts recommend minimizing app permissions, sourcing apps only from trusted platforms, and implementing real-time behavioral monitoring to mitigate the risks posed by such advanced mobile malware.

1 months ago
Android Banking Trojans and Financial Malware Targeting User Data and Payments

Android Banking Trojans and Financial Malware Targeting User Data and Payments

Multiple new Android malware campaigns have been identified targeting users' financial data and payment methods. Researchers uncovered advanced banking trojans such as BankBot-YNRK and DeliveryRAT, which harvest sensitive information from compromised devices and employ sophisticated evasion techniques, including emulator detection and device-specific targeting. These trojans often masquerade as legitimate apps, such as Indonesia's digital ID application, and can mute device notifications to avoid detection by victims. In addition, a next-generation Android banking trojan has been observed hiding within digital ID apps, automating the theft of cryptocurrency wallets and evading analysis environments. A separate large-scale scam involves over 760 malicious Android apps exploiting NFC and HCE technologies to steal payment card data globally. These apps facilitate unauthorized transactions by leveraging contactless payment features. The surge in Android-targeted financial malware highlights the growing risk to users' banking credentials, payment cards, and cryptocurrency assets, with attackers employing increasingly sophisticated methods to bypass security controls and evade user awareness.

1 months ago
Android Malware Leveraging Legitimate Apps for Surveillance and Theft

Android Malware Leveraging Legitimate Apps for Surveillance and Theft

Threat actors have increasingly adopted sophisticated techniques to distribute Android malware by disguising malicious applications as legitimate ones on the Google Play Store and other platforms. Notably, the new Cellik Android RAT has been identified as turning legitimate Google Play apps into surveillance tools, enabling attackers to covertly monitor and exfiltrate sensitive user data. In parallel, operations involving the Wonderland SMS stealer have merged dropper, SMS theft, and RAT capabilities at scale, with attackers using fake Google Play Store pages, ad campaigns, and messaging apps to propagate malware, particularly targeting users in Uzbekistan. These campaigns often leverage Telegram for coordination and distribution, and employ advanced methods such as intercepting OTPs and exfiltrating contact lists to facilitate financial theft and evade detection. The evolution of Android malware now includes the use of droppers that appear harmless but deploy malicious payloads locally after installation, even without an active internet connection. The Wonderland malware, attributed to the TrickyWonders group, demonstrates bidirectional command-and-control communication, allowing real-time execution of commands and theft of SMS messages. The convergence of these techniques highlights a growing trend in mobile threat operations, where attackers exploit the trust in legitimate app platforms and social engineering to compromise devices, steal credentials, and siphon funds from victims' bank accounts.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.