Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Android Malware Used Fake Apps to Charge Users in Mass Billing Scam

May 20, 2026

New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

May 20, 2026

China-Linked Webworm APT Evolves Tactics, Expands to European Targets

May 20, 2026
Facebook X (Twitter) Instagram
Wednesday, May 20
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Android Malware Used Fake Apps to Charge Users in Mass Billing Scam
News

Android Malware Used Fake Apps to Charge Users in Mass Billing Scam

Team-CWDBy Team-CWDMay 20, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A 10-month Android malware campaign has used nearly 250 fake apps to sign victims up to premium services on their mobile bills, with hardcoded operator targeting for users in Malaysia, Thailand, Romania and Croatia.

According to new analysis from Zimperium’s zLabs research team, the operation, dubbed Premium Deception by the mobile security company, ran from March 2025 to mid-January 2026. Portions of the infrastructure remain online at the time of publication.

The fake apps impersonate widely recognized brands, including Facebook Messenger, Instagram Threads, TikTok, Minecraft and Grand Theft Auto.

Three Variants, One Goal

zLabs identified three malware variants of escalating sophistication. The most advanced, deployed against Malaysian DiGi subscribers, automated the entire subscription workflow end to end.

After reading the device’s SIM operator code and matching it against a hardcoded list, the malware disables Wi-Fi to force traffic onto the cellular network, loads DiGi’s official billing portal in a hidden WebView and runs JavaScript to click the “Request TAC” button, fill in the intercepted one-time password (OTP) and confirm the subscription.

The OTP is then harvested through abuse of Google’s SMS Retriever API, a legitimate Android feature designed to read confirmation codes automatically without prompting the user.

Read more on Android malware campaigns: Malware Campaign Masquerades as Dating Apps to Steal Data

A second variant targeted Thai users with a multi-stage attack that fetched dynamic subscription targets from a command-and-control (C2) server, scheduled delayed SMS at 60 and 90-second intervals to defeat automated fraud detection and harvested session cookies from hidden carrier billing pages.

A third variant added real-time Telegram reporting, with the bot pinging attackers whenever a device was infected, permissions were granted or a premium SMS is sent.

Built For Optimization

The campaign infrastructure points to a well-organized commercial operation. Each malicious sample embeds an HTTP referrer header in the format {FakeAppName}-{Country}-{Platform}-{OperatorCode}, allowing attackers to measure which fake personas and distribution channels (TikTok, Facebook, Google) drive the most successful infections.

When deployed on a device whose SIM operator falls outside the target list, the malware silently displays a benign webview of apkafa.com to avoid suspicion and maintain persistence, an evasion pattern Zimperium maps to MITRE ATT&CK technique T1628.001.

zLabs identified at least 12 premium SMS short codes being abused across the four targeted countries, alongside C2 infrastructure spanning the modobomz[.]com and mwmze[.]com domains.

To defend against this and similar threats, users should avoid sideloading Android apps from third-party stores, audit installed apps against trusted brand names and review recent mobile bills for unexplained subscription charges.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution
Team-CWD
  • Website

Related Posts

News

New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

May 20, 2026
News

China-Linked Webworm APT Evolves Tactics, Expands to European Targets

May 20, 2026
News

New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots

May 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

What’s at stake if your employees post too much online

December 1, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.