ThreatCluster
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Cluster #1429

Android Banking Malware Masquerades as Government Agencies to Attack Users

Threat Score:
69
8 articles
100.0% similarity
7 days ago
JSON CSV Text STIX IoCs
Splunk Elastic Sentinel Sigma YARA All Queries

Activity Timeline

8 articles
Click to navigate
Jul 29
Jul 29
Jul 29
Jul 29
Jul 30
Jul 31
Jul 31
Jul 31
Oldest
Latest

Key Insights

1
The DoubleTrouble banking trojan has evolved to utilize Discord channels for distributing malware, enhancing its reach and evasion tactics - 'we have identified nine samples from the current campaign' according to zLabs.
2
RedHook, targeting Vietnamese users, uses phishing sites impersonating government and financial institutions to distribute malicious APKs - 'this malware exploits trust in official entities' stated Cyble Research.
3
ToxicPanda has compromised over 4,500 devices in Europe, primarily in Portugal and Spain, focusing on stealing banking credentials through advanced overlay techniques - 'this represents a significant increase in mobile banking malware incidents' according to Cleafy researchers.
4
The overall increase in Android banking trojan attacks has surged by 196% in 2024, totaling over 1.24 million incidents, reflecting the growing sophistication of mobile financial threats - as reported by Kaspersky.
5
Recent malware campaigns leverage social engineering tactics through fake applications, with one campaign involving over 250 malicious Android apps targeting users in South Korea - 'victims are drawn in by the promise of companionship' noted Zimperium researchers.
6
Security experts emphasize the need for users to exercise caution when downloading apps from unofficial sources, as these malware strains utilize advanced evasion techniques to bypass standard security measures.

Threat Overview

Recent developments in mobile banking malware have highlighted an alarming trend in cyber threats targeting users across Europe and Asia. The DoubleTrouble banking trojan, under close observation by zLabs, has shifted its distribution methods to exploit unsuspecting users via Discord channels and phishing sites that impersonate reputable banks. 'We have identified nine samples from the current campaign,' a zLabs researcher stated, emphasizing the malware's adaptability. The trojan employs Android's Accessibility Services to bypass permission restrictions, allowing it to operate covertly and steal sensitive data.

In parallel, the RedHook trojan has emerged as a significant threat, particularly in Vietnam, where it masquerades as legitimate applications from government and financial agencies. Cyble Research and Intelligence Labs (CRIL) reported that RedHook exploits phishing websites, like sbvhn[.]com, to distribute malicious APKs. 'This malware exploits trust in official entities,' said a CRIL analyst, highlighting the sophistication of the attack.

Furthermore, the ToxicPanda trojan has infected over 4,500 devices in Europe, with a notable concentration in Portugal and Spain. This malware employs advanced overlay techniques to capture login credentials and PINs from banking applications. 'This represents a significant increase in mobile banking malware incidents,' noted Cleafy researchers, indicating a wider trend in the rise of mobile threats.

The threat landscape has seen a staggering 196% increase in Android banking trojan attacks in 2024, totaling more than 1.24 million incidents, according to Kaspersky. This surge reflects a growing trend where attackers prioritize high-impact infections over mass-scale botnets.

The industry response has been robust, with security teams advising users to be vigilant when downloading applications, especially from unofficial sources. Security experts stress the importance of enabling two-factor authentication and regularly updating devices to mitigate risks. 'Users must exercise caution and be aware of the tactics employed by these malware strains,' a cybersecurity expert advised, highlighting the critical need for public awareness in combating mobile threats. As these malware campaigns continue to evolve, ongoing vigilance and proactive security measures will be essential in protecting sensitive information and preventing financial fraud.

Tactics, Techniques & Procedures (TTPs)

T1566.002
Spearphishing Link - Attackers distribute malicious APKs via phishing sites impersonating banks and government agencies [2][8]
T1190
Exploit Public-Facing Application - RedHook uses crafted phishing websites to achieve device compromise [8][6]
T1059.007
JavaScript/JScript - DoubleTrouble employs obfuscation techniques to hinder reverse engineering efforts [1][5]
T1557
Adversary-in-the-Middle - ToxicPanda utilizes overlay techniques to intercept user credentials [4][6]
T1053
Scheduled Task/Job - DoubleTrouble installs via session-based methods, enabling background operations [1][5]
T1105
Ingress Tool Transfer - RedHook establishes WebSocket connections for real-time communication with C2 servers [6][8]
T1003
OS Credential Dumping - ToxicPanda collects sensitive data from banking applications using overlay techniques [4][6]

Timeline of Events

2025-01-15
RedHook first observed in the wild targeting Vietnamese users via phishing sites [8]
2025-07-29
Cyble Research publicly discloses RedHook's distribution methods and capabilities [8]
2025-07-30
ToxicPanda's infection campaign reported to have compromised over 4,500 devices across Europe [6]
2025-07-31
zLabs reports on DoubleTrouble's evolution, highlighting its use of Discord for malware distribution [1][3]
Ongoing
Active detection of multiple banking trojans with increasing sophistication and targeted infection strategies [1][4][6]
Powered by ThreatCluster AI
Generated 4 days ago
AI analysis may contain inaccuracies

Related Articles

8 articles
1

Android Banking Malware Masquerades as Government Agencies to Attack Users

GB Hackers • 7 days ago

Android Banking Malware Masquerades as Government Agencies to Attack Users Cyble Research and Intelligence Labs (CRIL) has uncovered a sophisticated Android banking trojan dubbed RedHook, which disguises itself as legitimate applications from Vietnamese government and financial institutions to deceive users. This malware, first observed in the wild around January 2025, exploits phishing websites mimicking entities like the State Bank of Vietnam, Sacombank, Central Power Corporation, Traffic Poli

Score
60
95.0% similarity
Read more
2

New DoubleTrouble Banking Malware Targets Users Through Phishing Sites to Steal Credentials

GB Hackers • 5 days ago

New DoubleTrouble Banking Malware Targets Users Through Phishing Sites to Steal Credentials Researchers at zLabs have been closely monitoring the DoubleTrouble banking trojan, a rapidly evolving malware strain that has shifted its tactics to exploit unsuspecting users across Europe. Initially disseminated via phishing websites mimicking reputable banks, the trojan has now adapted to more insidious distribution methods, including bogus sites hosting samples directly in Discord channels. This pivo

Score
59
100.0% similarity
Read more
3

Android Malware Targets Banking Users Through Discord Channels

Infosecurity Magazine • 5 days ago

The DoubleTrouble Android banking Trojan has evolved, using Discord for delivery and introducing several new features

Score
58
100.0% similarity
Read more
4

ToxicPanda Android Banking Malware Compromises Over 4,500 Devices to Harvest Banking Credentials

GB Hackers • 7 days ago

ToxicPanda Android Banking Malware Compromises Over 4,500 Devices to Harvest Banking Credentials The ToxicPanda Android banking trojan has emerged as a significant threat, compromising over 4,500 devices primarily in Portugal and Spain as of early 2025, with a focus on stealing banking credentials, overlaying PIN and pattern codes, and enabling unauthorized transactions. Initially identified by Trend Micro in 2022 targeting Southeast Asia, the malware shifted to Europe in 2024, infecting around

Score
58
88.0% similarity
Read more
5

ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials

Cybersecurity News • 6 days ago

A sophisticated Android banking trojan known as ToxicPanda has successfully infiltrated over 4500 mobile devices across Europe, representing one of the most significant mobile banking malware campaigns observed in recent years. The malware specifically targets banking and digital wallet applications, employing advanced overlay techniques to steal login credentials, PIN codes, and pattern locks while enabling […]

Score
54
100.0% similarity
Read more
6

New Banking Malware DoubleTrouble Attacking Users Via Phishing Sites To Steal Banking Credentials

Cybersecurity News • 5 days ago

A sophisticated new banking trojan dubbed DoubleTrouble has emerged as a significant threat to mobile users across Europe, employing advanced evasion techniques and expanding its attack surface through novel distribution channels. The malware initially spread through phishing websites impersonating well-known European banking institutions, but has recently evolved to leverage bogus websites hosting malicious samples directly […]

Score
54
100.0% similarity
Read more
7

Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks

The Hacker News • 7 days ago

Cybersecurity researchers have discovered a new, large-scale mobile malware campaign that's targeting Android and iOS platforms with fake dating, social networking, cloud storage, and car service apps to steal sensitive personal data. The cross-platform threat has been codenamed SarangTrap by Zimperium zLabs. Users in South Korea appear to be the primary focus. "This extensive campaign involved over 250 malicious Android applications and more than 80 malicious domains, all disguised as legitimat

Score
51
88.0% similarity
Read more
8

Cyble Uncovers RedHook Android Trojan Targeting Vietnamese Users

The Cyber Express • 8 days ago

Cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) have uncovered a new Android banking trojan called RedHook that is actively targeting Vietnamese mobile users. The malware is distributed via carefully crafted phishing sites impersonating trusted financial and government agencies. Once installed, RedHook delivers a dangerous combination of phishing, keylogging, and remote access capabilities, enabling full control over infected devices, yet it remains low‑profile with limi

Score
47
92.0% similarity
Read more

Save to Folder

Choose a folder to save this cluster:

Cluster Intelligence

Key entities and indicators for this cluster

MITRE ATT&CK
T1071.001
T1102.002
T1566.001
T1059.001
T1210
MALWARE
RedHook
DoubleTrouble
ToxicPanda
VULNERABILITIES
Credential Theft
ATTACK TYPES
Overlay Attack
Credential Theft
Phishing
DOMAINS
skt9.iosgaxx423.xyz
sbvhn.com
api9.iosgaxx423.xyz
INDUSTRIES
Financial Services
COUNTRIES
South Korea
Spain
Portugal
Vietnam
SECURITY VENDORS
Kaspersky
PLATFORMS
iOS
Android
CLUSTER INFORMATION
Cluster #1429
Created 7 days ago
Semantic Algorithm

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration