Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Find your weak spots before attackers do

November 21, 2025

CISA Issues New Guidance on Bulletproof Hosting Threat

November 21, 2025

Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy

November 21, 2025
Facebook X (Twitter) Instagram
Friday, November 21
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers
News

Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers

Team-CWDBy Team-CWDNovember 20, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that’s sold on Russian-speaking Telegram channels under a Malware-as-a-Service (MaaS) model.

According to its seller, the malware enables device control and espionage, allowing threat actors to collect SMS messages, contacts, call logs, images, and videos, as well as intercept, reply, and delete incoming notifications.

“It’s a MaaS product with seller documentation, videos, and a bot-driven subscription model that helps novice attackers by providing a low barrier to entry,” Zimperium researcher Vishnu Pratapagiri said in a report last week.

“Because it targets financial workflows (fake windows for banks) and abuses the SMS handler role (for intercepting 2-factor SMS), it poses a direct threat to enterprise customers using BYOD and to any organization whose employees rely on mobile banking or sensitive mobile apps.”

The threat actor, in their advertisement for Fantasy Hub, refers to victims as “mammoths,” a term often used by Telegram-based cybercriminals operating out of Russia.

Customers of the e-crime solution receive instructions related to creating fake Google Play Store landing pages for distribution, as well as the steps to bypass restrictions. Prospective buyers can choose the icon, name, and page they wish to receive a slick-looking page.

The bot, which manages paid subscriptions and builder access, is also designed to let threat actors upload any APK file to the service and return a trojanized version with the malicious payload embedded into it. The service is available for one user (i.e., one active session) for a weekly price of $200 or for $500 per month. Users can also opt for a yearly subscription that costs $4,500.

The command-and-control (C2) panel associated with the malware provides details about the compromised devices, along with information about the subscription status itself. The panel also offers the attackers the ability to issue commands to collect various kinds of data.

“Sellers instruct buyers to create a bot, capture the chat ID, and configure tokens to route general and high-priority alerts to separate chats,” Zimperium said. “This design closely mirrors HyperRat, an Android RAT that was detailed last month.”

As for the malware, it abuses the default SMS privileges like ClayRAT to obtain access to SMS messages, contacts, camera, and files. By prompting the user to set it as the default SMS handling app, it allows the malicious program to obtain multiple powerful permissions in one go rather than having to ask for individual permissions at runtime.

The dropper apps have been found to masquerade as a Google Play update to lend it a veneer of legitimacy and trick users into granting it the necessary permissions. Besides using fake overlays to obtain banking credentials associated with Russian financial institutions such as Alfa, PSB, T-Bank, and Sberbank, the spyware relies on an open-source project to stream camera and microphone content in real-time over WebRTC.

“The rapid rise of Malware-as-a-Service (MaaS) operations like Fantasy Hub shows how easily attackers can weaponize legitimate Android components to achieve full device compromise,” Pratapagiri said. “Unlike older banking trojans that rely solely on overlays, Fantasy Hub integrates native droppers, WebRTC-based live streaming, and abuse of the SMS handler role to exfiltrate data and impersonate legitimate apps in real time.”

The disclosure comes as Zscaler ThreatLabz revealed that Android malware transactions increased by 67% year-over-year, driven by sophisticated spyware and banking trojans. As many as 239 malicious applications have been flagged on the Google Play Store, with the apps being downloaded 42 million times collectively between June 2024 and May 2025.

Some of the noteworthy Android malware families observed during the time period were Anatsa (aka TeaBot and Toddler), Void (aka Vo1d), and a never-before-seen Android RAT dubbed Xnotice that has targeted job seekers in the oil and gas sector in the Middle East and North African regions by passing off as job application apps distributed via fake employment portals.

Once installed, the malware steals banking credentials through overlays, and collects other sensitive data like multi-factor authentication (MFA) codes, SMS messages, and screenshots.

CIS Build Kits

“Threat actors deploy sophisticated banking trojans like Anatsa, ERMAC, and TrickMo, which often masquerade as legitimate utilities or productivity apps on both official and third-party app stores,” the company said. “Once installed, they use highly deceptive techniques to capture usernames, passwords, and even the two-factor authentication (2FA) codes needed to authorize transactions.”

The findings also follow an advisory from CERT Polska about new samples of Android malware called NGate (aka NFSkate) targeting users of Polish banks to plunder card details via Near Field Communication (NFC) relay attacks. Links to the malicious apps are distributed via phishing emails or SMS messages that purport to come from the banks and warn recipients of a technical problem or a security incident, thereby nudging them into installing the app.

Upon launching the app in question, the victim is prompted to verify their payment card directly within the app by tapping it on the back of the Android device. However, doing so causes the app to stealthily capture the card’s NFC data and exfiltrate it to an attacker-controlled server, or directly to a companion app installed by the threat actor who wants to withdraw cash from an ATM.

“The campaign is designed to enable unauthorized cash withdrawals at ATMs using victims’ own payment cards,” the agency said. “Criminals don’t physically steal the card; they relay the card’s NFC traffic from the victim’s Android phone to a device the attacker controls at an ATM.”



Source

computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates data breach hacker news hacking news how to hack information security network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleHalf of Ransomware Access Due to Hijacked VPN Credentials
Next Article Eternidade Stealer Trojan Fuels Aggressive Brazil Cybercrime
Team-CWD
  • Website

Related Posts

News

CISA Issues New Guidance on Bulletproof Hosting Threat

November 21, 2025
News

Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy

November 21, 2025
News

UNC2891 Money Mule Network Reveals Full Scope of ATM Fraud Operation

November 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

In memoriam: David Harley

November 12, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.