Skip to main content
Mallory

Scams and Malware Abusing Google Branding to Steal Cryptocurrency

cryptocurrency-platform-riskidentity-impersonation-fraudphishing-campaign-intelligenceremote-access-implantpersistence-method
Updated March 21, 2026 at 05:52 AM2 sources
Share:
Scams and Malware Abusing Google Branding to Steal Cryptocurrency

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Security researchers reported multiple campaigns abusing Google branding to drive crypto theft. Malwarebytes identified a polished fraudulent “presale” site promoting a fake token called “Google Coin” and embedding a chatbot that impersonates Google Gemini; the bot delivers a scripted investment pitch, cites specific token pricing and a “2026 roadmap,” and steers victims toward sending irreversible cryptocurrency payments while avoiding verifiable corporate, regulatory, or registration details.

Separately, Kaspersky’s Securelist detailed BeatBanker, an Android malware campaign targeting Brazil that spreads via phishing to a website masquerading as the Google Play Store (e.g., cupomgratisfood[.]shop) and distributing trojanized APKs such as a fake “INSS Reembolso” app. The malware combines a cryptominer with a banking Trojan capable of device hijacking and screen overlays, including swapping destination addresses during USDT transactions in apps like Binance and Trust Wallet; newer samples reportedly replaced the banking module with BTMOB RAT while retaining the broader infection chain and persistence techniques (including looping near-inaudible audio to resist termination).

Timeline

  1. Mar 10, 2026

    Malwarebytes reports fake Gemini chatbot promoting 'Google Coin' scam

    Malwarebytes researchers reported a cryptocurrency scam that impersonates Google branding and a Gemini-like AI assistant to market a fake token called “Google Coin.” The fraudulent presale site used a scripted chatbot, false trust logos, and directed victims to a fake wallet dashboard and Bitcoin payment request.

  2. Mar 10, 2026

    Newer BeatBanker variants switch from banking Trojan to BTMOB RAT

    Kaspersky said newer BeatBanker samples retained the miner and persistence mechanisms but replaced the earlier banking module with the BTMOB RAT, a MaaS remote administration tool associated with the CraxsRAT/CypherRAT/SpySolr ecosystem. The report also detailed extensive remote-control capabilities including screen capture, keylogging, SMS sending, device locking or wiping, and audio recording.

  3. Mar 10, 2026

    BeatBanker Android campaign targets Brazilian users via fake Play Store site

    Kaspersky reported an Android malware campaign in Brazil in which victims were lured through phishing pages mimicking the Google Play Store to install trojanized apps such as “INSS Reembolso.” The malware used packed loaders, in-memory DEX execution, persistence tricks, and deployed a Monero miner while earlier waves also included a banking Trojan.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

March 10, 2026 at 03:38 PM

Related Stories

Fake Gemini Chatbot Used to Sell Phony “Google Coin” Cryptocurrency

Fake Gemini Chatbot Used to Sell Phony “Google Coin” Cryptocurrency

Researchers reported an active cryptocurrency scam using a polished “Google Coin” presale website paired with a **fake chatbot impersonating Google’s Gemini AI assistant**. The site presents “Google Coin” as a legitimate Google-backed token (Google has no such cryptocurrency) and uses Gemini-like branding cues (e.g., sparkle icon and “Online” status) to build trust while guiding victims toward **irreversible crypto payments** to attacker-controlled wallets. The impersonating chatbot is designed to function as an automated closer: it answers investment questions, provides specific (fabricated) return projections (e.g., presale price vs. expected listing price), and persistently steers users toward purchase. Analysis noted the bot maintained a consistent “official helper” persona while **refusing verifiable company details** (registered entity, regulator/license, audit firm, official email) and deflecting concerns with vague claims about “transparency” and “security,” mirroring high-pressure social engineering tactics previously requiring human operators.

1 months ago
BeatBanker Android Malware Campaign Impersonating Starlink and Government Apps

BeatBanker Android Malware Campaign Impersonating Starlink and Government Apps

**Kaspersky** reported a new Android malware campaign dubbed **BeatBanker** targeting users in Brazil, distributed via phishing sites that closely mimic the *Google Play Store* and lure victims into installing trojanized APKs posing as legitimate apps such as **Starlink** and the Brazilian government services app **INSS Reembolso**. The infection chain is staged to reduce suspicion: an initial decoy app presents a fake in-app “update” flow that prompts users to grant permission to install additional apps/modules, after which the malware pulls down further payloads and requests expanded privileges. Technical reporting indicates BeatBanker blends **banking trojan** capabilities with **cryptomining** (including a modified *XMRig*), and newer variants may deploy the commodity Android RAT **BTMOB** in place of the banking module, enabling broad device takeover (e.g., keylogging, screen recording, camera access, GPS tracking, and credential capture). The malware uses evasion techniques such as decrypting and loading hidden DEX code in-memory, performing anti-analysis environment checks, delaying malicious actions post-install, and maintaining persistence by continuously playing a near-inaudible MP3 (`output8.mp3`) to keep a foreground service alive and reduce the likelihood of the process being suspended by Android power management.

1 months ago
AI-Assisted Cryptocurrency Investment Scams Targeting Japan via Malvertising and Pig-Butchering Tactics

AI-Assisted Cryptocurrency Investment Scams Targeting Japan via Malvertising and Pig-Butchering Tactics

Threat actors are running cryptocurrency investment scams across Asia—**heavily targeting Japan**—that blend **malvertising** (paid ads on platforms such as Facebook and Instagram) with **pig butchering**-style long-con social engineering. Infoblox reported identifying large clusters of suspicious domains (including domains consistent with **registered domain generation algorithms (RDGAs)**) disproportionately queried by users in Japan; victims are funneled from fake ads impersonating financial experts or “AI-driven” trading systems to lure sites that push them into messaging apps (e.g., **LINE**, WhatsApp, KakaoTalk) via links or QR codes. Once in chats, victims are engaged by **AI bots** posing as experts/assistants, fed fabricated success stories, and nudged from small “test” deposits to larger transfers; when victims attempt withdrawals, scammers demand additional payments such as a **“release fee.”** Reported losses tied to this activity have reached **up to ¥10 million** per victim. A related pattern shows scammers using **AI chatbots as high-pressure sales agents** for fake crypto offerings: Malwarebytes documented a live “**Google Coin**” presale site using a chatbot impersonating Google’s **Gemini** branding to provide tailored investment projections and steer victims toward **irreversible cryptocurrency payments**; Google does not have a cryptocurrency. While this “Google Coin” case is a separate scam instance from the Japan-focused malvertising/pig-butchering operation, it reinforces the same operational shift highlighted by Infoblox: **automation and AI-driven conversational tooling** are increasingly replacing human operators to scale persuasion, maintain consistent scam personas, and accelerate victim conversion from initial interest to payment.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.