Skip to main content
Mallory

Android Mobile Device Security Research on Payment App Abuse and Chip-Level Unlock Risks

financial-sector-threatcredential-access-methoddata-exfiltration-methodinitial-access-methodembedded-device-vulnerability
Updated March 21, 2026 at 05:46 AM2 sources
Share:
Android Mobile Device Security Research on Payment App Abuse and Chip-Level Unlock Risks

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Recent reporting highlights two separate Android security research tracks, not a single incident. One report details how attackers can abuse the LSPosed framework on already-compromised Android devices to hook SmsManager and TelephonyManager, intercept registration tokens, spoof phone numbers, exfiltrate 2FA data, and remotely inject fake SMS records into the device’s sent-message database. The technique targets mobile payment ecosystems that rely on SIM binding, allowing bank backends to be misled about physical SIM presence and enabling account takeover and fraud when victims have first been infected through trojanized APKs.

Separate coverage describes a MediaTek secure boot chain flaw affecting up to 875 million Android phones, where an attacker with physical possession of a device and USB access could extract encryption-related keys before Android fully loads, decrypt storage offline, and rapidly brute-force the PIN. That issue is distinct from unrelated reporting on Intel UEFI vulnerabilities, which concerns local privilege-escalation flaws in PC firmware rather than Android devices. The material is not fluff because it contains substantive vulnerability and threat research with concrete attack paths and mitigation guidance, including stronger device integrity enforcement and backend validation for payment workflows.

Timeline

  1. Mar 17, 2026

    CloudSEK details LSPosed-based Android payment fraud technique

    CloudSEK published research describing a malicious LSPosed module called "Digital Lutera" that manipulates Android telephony and SMS APIs to enable remote SMS injection, identity spoofing, and payment account takeover. The report attributed the tooling to a Telegram actor known as "Berlin" (@Syntext_Erorr) and outlined mitigations for Indian mobile payment ecosystems.

  2. Mar 16, 2026

    Researchers disclose MediaTek flaw impacting up to 875 million Android phones

    Researchers at Ledger’s Donjon Hacker Lab publicly disclosed a vulnerability affecting MediaTek-powered Android devices, potentially impacting about 875 million phones. They showed the issue could be exploited in roughly 60 seconds and demonstrated a proof of concept on the Nothing CMF Phone 1, with users advised to check for the March Android security patch.

  3. Jan 1, 2026

    MediaTek patches Android chip flaw affecting secure boot chain

    MediaTek issued a fix in January for a chip-level vulnerability in the secure boot chain of its Android phone chipsets. The flaw could let an attacker with physical USB access extract full-disk encryption keys from a locked device before Android fully loads.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Hardware-Level Android Chip Vulnerabilities Enable Device Compromise

Hardware-Level Android Chip Vulnerabilities Enable Device Compromise

Security researchers and vendors reported **hardware/firmware-level vulnerabilities in Android chip components** that can enable deep device compromise beyond typical app-layer defenses. Ledger’s Donjon research described a flaw involving **MediaTek chip boot-chain behavior and Trustonic’s trusted execution environment (TEE)** that allowed rapid physical compromise: by connecting an affected phone to a laptop over **USB**, attackers could allegedly brute-force the PIN, decrypt storage, and extract sensitive data including messages and **cryptocurrency wallet seed phrases** (e.g., Kraken Wallet, Phantom). The researchers estimated the affected MediaTek chips appear in roughly **one-quarter of Android phones**, disproportionately in lower-cost devices. Separately, Zimperium reported active exploitation of a **Qualcomm graphics zero-day** (**CVE-2026-21385**) in targeted Android attacks, describing a memory-corruption condition that could enable code execution or unauthorized access across “hundreds” of Qualcomm chipsets. A ZDNET article on Android’s *Repair Mode* primarily provides user guidance and anecdotal troubleshooting around a buggy March update/SIM recognition issue; it does not substantively address the chip-level vulnerabilities described in the other reporting and is best treated as tangential consumer advice rather than incident or vulnerability intelligence.

1 months ago
Android Mobile Malware Campaigns Targeting SMS/OTP and Identity Data

Android Mobile Malware Campaigns Targeting SMS/OTP and Identity Data

Multiple reports highlight evolving **Android** threats that abuse SMS/telephony access and advanced evasion to enable fraud, surveillance, and account takeover. CloudSEK described a shift from repackaged apps to **runtime manipulation** using the *LSPosed* framework, where a malicious module (e.g., **Digital Lutera**) hooks `SmsManager` and `TelephonyManager` to undermine India’s **UPI SIM-binding** controls. The technique can intercept registration tokens and 2FA, spoof device identity/phone number, and exfiltrate data to **Telegram**; it also uses **Socket.IO** for real-time C2 and can remotely inject fabricated SMS entries into the device’s “Sent” database to make bank backends believe a SIM is present on a different device, enabling scalable payment fraud and account takeover. Separately, Acronis TRU (reported by Hackread) identified a **fake Red Alert** rocket-warning app distributed via SMS lures impersonating Israel’s Home Front Command; the trojanized app displays legitimate alerts to reduce suspicion while requesting extensive permissions to steal **GPS location**, **SMS/OTP**, contacts, installed-app inventory, and on-device account details, then exfiltrates data to a remote server, including via **certificate spoofing** and UI tricks to appear Play Store-installed. Zimperium reported a new Android RAT, **SurxRAT**, that can download and run **LLM modules** from third-party repositories to automate phishing and social engineering and to interact with apps/UI for credential theft and data exfiltration, reinforcing the need for behavior-based mobile detection, tighter app controls, and stronger integrity enforcement (e.g., *Play Integrity API* with `MEETS_STRONG_INTEGRITY`) where applicable.

1 months ago
Supply-Chain Tampering and Persistent Malware Risks on Android and Smartphones

Supply-Chain Tampering and Persistent Malware Risks on Android and Smartphones

Reporting highlighted **supply-chain malware pre-installed on Android devices** during manufacturing/distribution, enabling low-level capabilities such as data exfiltration, command execution, and persistent unauthorized access before a user ever installs apps. The reporting emphasized that this type of embedded compromise can bypass typical app-based defenses and app-store controls, making mobile devices a durable foothold into personal and corporate environments; recommended mitigations included verifying device integrity, enforcing secure boot chains, and monitoring behavior across managed mobile fleets. Separately, academic research described a **remote “fingerprinting” method** to detect whether a smartphone has been altered during manufacturing by comparing its cellular radio emissions against a library of trusted device/model fingerprints using standards-compliant base-station emulation and specialized SIMs. Another write-up focused on **post-install Android malware persistence techniques** (e.g., `BOOT_COMPLETED` autostart via `BroadcastReceiver`, abuse of overlays to block force-stop/uninstall, and self-restart behaviors), which is related to mobile malware resilience but is not specific to supply-chain preinstallation or the cited manufacturing-tamper investigations.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Android Mobile Device Security Research on Payment App Abuse and Chip-Level Unlock Risks | Mallory