Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

TON Price Prediction: $1.50 Target as Technical Indicators Signal Potential 13% Rally

May 2, 2026

The Cheap Foreign Labor Regime Blocking Agricultural Intelligence

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»New Android Trojan Variant Expands with Ransomware Tactics
New Android Trojan Variant Expands with Ransomware Tactics
Security

New Android Trojan Variant Expands with Ransomware Tactics

February 9, 2026No Comments2 Mins Read

A new version of the Hook Android banking Trojan has surfaced, showcasing one of the most extensive feature sets ever recorded for mobile malware.

Researchers at Zimperium’s zLabs identified the variant, which now supports 107 remote commands – of which 38 are newly introduced.

The upgraded malware goes beyond financial theft, adopting ransomware-style methods and advanced surveillance tools.

Among its latest functions are:

  • Ransomware overlays that coerce users into making payments

  • Fake NFC scanning prompts designed to steal sensitive data

  • Lock screen bypass using deceptive PIN and pattern screens

  • Transparent overlays for capturing gestures

  • Real-time screen-streaming for full monitoring

“The campaign is operating on a truly global scale,” warned Frankie Sclafani, director of cybersecurity enablement at Deepwatch.

“The detection count has more than doubled in just two weeks, reflecting a rapid and aggressive growth pattern.”

Read more on Android malware threats: Android Malware Targets Banking Users Through Discord Channels

Unlike previous campaigns that relied mainly on phishing sites, Hook’s operators are now spreading malicious APK files through GitHub repositories.

Zimperium reported that other malware families, including Ermac, Brokewell and various SMS spyware strains, are also being distributed this way.

“This phishing campaign is tricky because it personalizes fake websites with the victim’s own email and company logo, making the scam look real,” explained J Stephen Kowski, field CTO at SlashNext.

“The malicious files delivered are not just for stealing passwords but for installing powerful remote access tools that give attackers long-term control.”

Zimperium confirmed Hook also continues to exploit Android Accessibility Services for automated fraud and device control.

See also  Couples recount strain from recent crypto losses

As mentioned above, its most alarming new feature is a ransomware overlay that displays a payment demand with a cryptocurrency wallet address controlled by attackers. Fake credit card forms, mimicking services like Google Pay, are also used to harvest payment information.

Code references found in the Trojan suggest its developers may add RabbitMQ for more resilient command-and-control (C2) communications. There are also traces of Telegram-based functionality under development, though these features remain incomplete.

Zimperium stated that it has collaborated with industry partners to remove at least one GitHub repository associated with distribution of the malware.

The rapid evolution of Hook underscores how traditional banking Trojans are adopting spyware and ransomware tactics.

As Sclafani concluded, “this is a complete attack process designed to secretly install a persistent malicious payload inside your network,” making it a growing concern for enterprises and individuals alike.

Source link

Android Expands ransomware Tactics Trojan Variant

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026
Top Posts

Bitcoin Miners Are Outperforming BTC This Year – Here’s Why

October 24, 2023

JEN AI: Futureverse and Alibaba Cloud’s Music Industry Partnership

October 30, 2023

As AI Agents Get Involved in Financial Data Sharing, Leading Standards Body Launches Initiative to Stay Ahead

April 14, 2026

Type above and press Enter to search. Press Esc to cancel.