Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Pall Mall Process to Define Responsible Commercial Cyber Intrusion

December 3, 2025

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

December 3, 2025

Europol Takes Down Illegal Cryptocurrency Mixing Service

December 3, 2025
Facebook X (Twitter) Instagram
Wednesday, December 3
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New Android Albiriox Malware Gains Traction in Dark Web Markets
News

New Android Albiriox Malware Gains Traction in Dark Web Markets

Team-CWDBy Team-CWDDecember 1, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new Android malware family, promoted as a Malware-as-a-Service (MaaS), has surfaced on Russian-speaking cybercrime forums, offering full device takeover and real-time fraud capabilities.

Known as Albiriox, the malware is designed to support On-Device Fraud (ODF) and already targets more than 400 banking and cryptocurrency applications worldwide, according to an analysis published by the Cleafy Threat Intelligence team.

A fast-growing Android threat with remote control and credential-harvesting features, Albiriox moved from a private beta in September 2025 to a public MaaS model introduced in October.

Forum posts show operators marketing the malware’s accessibility-based VNC module, which allows attackers to interact with an infected device remotely. Subscription access launched at $650 per month before rising to $720 after October 21.

Early Campaigns Point to Targeted Rollout

The first observed deployment wave appeared limited in scope. One campaign targeted Austrian mobile users via SMS links that led to German-language phishing pages. Victims were initially directed to a fake Google Play site that distributed a malicious “Penny Market” app, which served as a dropper for the final Albiriox payload.

Later, attackers shifted to a phone-number collection scheme that delivered download links via WhatsApp, filtering inputs to accept only Austrian numbers.

Researchers found that the dropper used JSONPacker to obfuscate the underlying code, prompting victims to enable the “Install Unknown Apps” permission before installing Albiriox. Once active, the malware connects to its command server over an unencrypted TCP channel and registers the device using hardware and OS identifiers.

Read more on Android banking malware: Android Devices Targeted By KONNI APT in Find Hub Exploitation

The investigation shows Albiriox supports a wide set of fraud-enabling functions, including:

  • Real-time screen streaming via VNC and accessibility-based views

  • Black-screen and system-update overlays

  • UI automation such as clicks, swipes, text input and app launches

Operators Prioritize Evasion

Cleafy also identified forum discussions in which buyers asked whether Albiriox was fully undetectable. The developers responded by highlighting a custom builder that integrates the Golden Crypt crypting service to evade static scanning.

The firm concluded that Albiriox reflects an accelerating shift toward ODF-focused mobile malware. With its MaaS model, two-stage delivery chain and broad targeting list, analysts expect the malware to mature quickly and pose a growing risk to financial institutions worldwide.

“This multi-dimensional visibility enables financial institutions to detect compromise at the earliest stages of the attack chain and enforce precise, context-aware response policies before fraud is executed,” Cleafy wrote.

“As mobile banking threats continue to mature, the ability to orchestrate these indicators into actionable defenses will prove essential for staying ahead of this emerging class of Android malware.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
Next Article APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
Team-CWD
  • Website

Related Posts

News

Pall Mall Process to Define Responsible Commercial Cyber Intrusion

December 3, 2025
News

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

December 3, 2025
News

Europol Takes Down Illegal Cryptocurrency Mixing Service

December 3, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

What is it, and how do I get it off my device?

September 11, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.