ThreatCluster
  • Feed
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Malicious Android Apps Mimic as Popular Indian Banking Apps Steal Login Credentials

Threat Score:
60
Cybersecurity News
21 hours ago
Part of cluster #1298

Overview

Attackers are weaponizing India’s appetite for mobile banking by circulating counterfeit Android apps that mimic the interfaces and icons of public-sector and private banks. Surfacing in telemetry logs on 3 April 2025, the impostors travel through smishing texts, QR codes and -engine poisoning, tricking users into sideloading the packages. During the initial execution window, a […]...

Continue Reading on Original Site

Related Articles

5 articles
1

2025-07-26 - Cluster AI Daily Threat Brief

ThreatCluster • 6 hours ago

# Daily Threat Intelligence Brief - July 26, 2025 ## Executive Summary Today's threat landscape remains dynamic and increasingly complex, with a notable rise in attacks targeting critical infrastructure and enterprise services. The most pressing threats stem from **phishing campaigns**, **ransomware attacks**, and **vulnerabilities in widely-used platforms** such as Microsoft SharePoint and AWS. With global ransomware incidents reportedly down 43% in the second quarter, the threat actors are r

Score
76
Read more
2

Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide

Cybersecurity News • 11 hours ago

Microsoft is currently facing an outage that affects the Microsoft 365 Admin Center, preventing administrators from accessing essential management tools. The issue, which emerged prominently on July 24, 2025, has persisted into the following day, marking the second such incident this week and raising concerns service reliability. As businesses rely heavily on Microsoft 365 […]

Score
72
Read more
3

New VOIP-Based Botnet Attacking Routers Configured With Default Password

Cybersecurity News • 37 minutes ago

A sophisticated global botnet campaign targeting VOIP-enabled routers and devices configured with default credentials.  The discovery began when analysts noticed an unusual cluster of malicious IP addresses concentrated in rural New Mexico, leading to the identification of approximately 500 compromised devices worldwide. Key Takeaways1. Hackers are exploiting VOIP routers with default Telnet passwords to build […]

Score
70
Read more
4
Microsoft SharePoint Hackers Switch Gears to Spread Ransomware

Microsoft SharePoint Hackers Switch Gears to Spread Ransomware

TechRepublic Security • 8 hours ago

Recent attacks targeting Microsoft SharePoint have escalated, with threat actors now deploying ransomware on vulnerable systems, according to Microsoft. This surge in malicious activity follows the release of multiple SharePoint security patches in July. Anupdate published to Microsoft’s blogreads, in part: “Expanded analysis and threat intelligence from our continued monitoring of exploitation activity by Storm-2603 leading to the deployment of Warlock ransomware.” Detailing the attack At least

Score
70
Read more
5
The Ηоmоgraph Illusion: Not Everything Is As It Seems

The Ηоmоgraph Illusion: Not Everything Is As It Seems

Palo Alto Unit 42 • 9 hours ago

Threat Research Center Threat Research The Ηоmоgraph Illusion: Not Everything Is As It Seems By:Gal Guzman Gal Guzman Published:July 25, 2025 Categories:Business Email CompromiseMalwareThreat Research Malware Threat Research Tags:DocusignGenAIGooglePhishing Docusign GenAI Google Phishing Executive Summary Since the creation of the internet, email attacks have been the predominant attack vector for spreading malware and gaining initial access to systems and endpoints. One example of an effective

Score
69
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

INDUSTRIES
Banking
COUNTRIES
India
PLATFORMS
Android
RANSOMWARE
AnDROid
mimic
MALWARE
Careto
ARTICLE INFORMATION
Article #4751
Published 21 hours ago
Cybersecurity News