Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Brazil's central bank bans stablecoin and crypto settlement in cross-border payments

May 2, 2026

Maple Finance’s SYRUP Token Now Available on Revolut in UK and EU

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»New AppLite Malware Targets Banking Apps in Phishing Campaign
New AppLite Malware Targets Banking Apps in Phishing Campaign
Security

New AppLite Malware Targets Banking Apps in Phishing Campaign

February 25, 2026No Comments3 Mins Read

A sophisticated phishing campaign distributing a newly identified malware variant called AppLite Banker has been uncovered.

Security researchers from Zimperium’s zLabs identified the malware as an updated version of the Antidot banking Trojan.

The campaign, which primarily targets Android devices, employs advanced social engineering techniques to steal credentials and compromise devices used for both personal and corporate purposes.

Key Tactics Used in the Campaign

“This latest mobile-targeted phishing campaign represents a sophisticated evolution of techniques first seen in Operation Dream Job, now adapted for the mobile era,” commented Stephen Kowski, field CTO at SlashNext.

“While the original Operation Dream Job used LinkedIn messages and malicious attachments to target job seekers in the defense and aerospace sectors, today’s attacks have expanded to exploit mobile vulnerabilities through fraudulent job application pages and banking Trojans.”

In fact, the AppLite Banker attackers pose as recruiters or HR representatives from well-known companies to deceive victims. Phishing emails designed to mimic legitimate job offers direct users to fake landing pages. These sites then trick users into downloading a fraudulent CRM application, which serves as a dropper to install the AppLite malware.

Once installed, the malware enables a range of malicious activities:

  • Credential theft targeting banking, cryptocurrency and financial apps

  • Abuse of Accessibility Services for screen overlays and self-permissions

  • Remote control via Virtual Network Computing (VNC)

  • Use of deceptive overlays to harvest user credentials

Zimperium researchers found that the malware targets 172 applications, including financial platforms and crypto wallets, and employs advanced tools to manipulate device functionality and intercept sensitive information.

To bypass detection, AppLite uses ZIP file manipulation to confuse security tools and embeds malicious scripts into HTML overlays. These methods allow it to remain undetected by many conventional analysis tools.

See also  Crypto-Stealing Campaign Deploys MortalKombat Ransomware

Read more about cybersecurity challenges in the financial sector: APP Fraud Singled Out as Biggest Financial Crime Threat

The malware’s reach extends to users proficient in English, Spanish, French, German, Italian, Portuguese and Russian, with a focus on regions where targeted apps are popular. Its ability to steal lock screen credentials and automate screen unlocking is particularly concerning, granting attackers near-total control of infected devices.

Mitigating the Threat

Security researchers highlighted the importance of proactive defenses to detect and neutralize zero-day threats such as this.

“As mobile devices have become essential to business operations, securing them is crucial, especially to protect against the large variety of different types of phishing attacks, including these sophisticated mobile-targeted phishing attempts,” explained Patrick Tiquet, vice president of security & architecture at Keeper Security.

“Organizations should implement robust Mobile Device Management (MDM) policies, ensuring that both corporate-issued and BYOD devices comply with security standards. Regular updates to both devices and security software will ensure that vulnerabilities are promptly patched – safeguarding against known threats that target mobile users.”

Update, a Google spokesperson sent the follow statement to Infosecurity on December 13. 

“Based on our current detection, no apps containing this malware are found on Google Play. Android users are automatically protected against known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services. Google Play Protect can warn users or block apps known to exhibit malicious behavior, even when those apps come from sources outside of Play,” a Google spokesperson said. 

See also  WIF Price Prediction: Targets $0.19 Resistance Test by Mid-April

Source link

AppLite Apps Banking Campaign Malware Phishing Targets

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026
Top Posts

English school turned BTC miner in China expands capacity with 220 new units

November 3, 2023

Some Call It Conspiracy Theory, Part 1

October 19, 2023

Aave Delegate Slams Aave Labs’ Track Record as Governance Dispute Continues

February 26, 2026

Type above and press Enter to search. Press Esc to cancel.