Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January

March 19, 2026

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

March 19, 2026

Vidar Stealer 2.0 Exploits Fake Game Cheats on GitHub, Reddit

March 19, 2026
Facebook X (Twitter) Instagram
Thursday, March 19
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Android OS-Level Attack Bypasses Mobile Payment Security
News

Android OS-Level Attack Bypasses Mobile Payment Security

Team-CWDBy Team-CWDMarch 17, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new Android attack technique that manipulates the runtime environment instead of modifying applications has been identified.

The method, discovered by CloudSEK researchers, uses the LSPosed framework to interfere with system-level processes, allowing attackers to hijack legitimate payment apps without altering their code or triggering standard security checks.

This approach differs from earlier attacks that relied on repackaged APKs. Instead, it targets the underlying operating system, enabling malicious modules to intercept and alter communications between apps and the device. As a result, app signatures remain valid and protections such as Google Play Protect are bypassed.

The technique has been linked to a module known as “Digital Lutera,” which exploits Android APIs to intercept SMS messages, spoof device identities and extract two-factor authentication (2FA) data in real time.

Exploiting SIM-Binding and System APIs

At the centre of the attack is the breakdown of SIM-binding, a key security feature used in mobile payment systems. This process typically ensures that a bank account is tied to a physical SIM card and device.

Attackers undermine this mechanism by:

  • Intercepting SMS verification tokens

  • Spoofing phone numbers via system APIs

  • Injecting fake SMS records into device databases

  • Using real-time command servers to coordinate actions

By combining a compromised victim device with a manipulated attacker device, fraudsters can trick bank servers into believing the victim’s SIM is present elsewhere. This allows unauthorised account access and transaction approvals.

Read more on mobile payment security: Ghost Tap Malware Fuels Surge in Remote NFC Payment Fraud

Large-Scale Fraud Risk

CloudSEK noted that this method has a substantial impact. It enables real-time fraud orchestration and scalable account takeovers, with attackers able to reset payment PINs and transfer funds without the victim’s awareness.

Activity linked to the operation has also been observed on Telegram, where attackers appear to share intercepted login data and coordinate access attempts. One channel analyzed during the research contained more than 500 login-related messages, indicating the technique is already being used in active campaigns.

The attack also exposes weaknesses in existing trust models. Banks often rely on SMS headers and device signals as proof of authenticity, assumptions that this method effectively breaks.

Additionally, the use of persistent system-level modules makes detection and removal difficult. Even reinstalling affected apps does not eliminate the threat, as the malicious hooks remain active within the operating system.

To mitigate risks, experts recommend stronger integrity checks, including hardware-based verification and stricter backend validation of SMS delivery. Moving away from device-reported data toward carrier-level confirmation is also seen as critical in countering this evolving threat.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThreat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
Next Article APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
Team-CWD
  • Website

Related Posts

News

AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January

March 19, 2026
News

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

March 19, 2026
News

Vidar Stealer 2.0 Exploits Fake Game Cheats on GitHub, Reddit

March 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Watch out for SVG files booby-trapped with malware

September 22, 2025

What it takes to fool facial recognition

March 14, 2026

Here’s what you should know

February 6, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.