Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

My tech has by no means been cleaner due to this Canadian cleansing resolution

February 19, 2026

Risevest secures Fund Supervisor licence from SEC

February 19, 2026

NS vans paper data to Ontario

February 19, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • My tech has by no means been cleaner due to this Canadian cleansing resolution
  • Risevest secures Fund Supervisor licence from SEC
  • NS vans paper data to Ontario
  • This analyst simply raised his worth goal on CAE
  • AI is ‘the wild west proper now.’ These consultants clarify how cities can use it ethically.
  • Finest Limitless Cellphone Plan: T-Cellular, AT&T, Verizon In contrast (2026)
  • Saudi Vacationers Develop World Horizons as Rising Locations Achieve Momentum in 2025
  • Airtel Africa turns to Starlink to shut protection gaps
Thursday, February 19
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - Faux IPTV Apps Unfold Massiv Android Malware Concentrating on Cellular Banking Customers
Cybersecurity & Digital Rights

Faux IPTV Apps Unfold Massiv Android Malware Concentrating on Cellular Banking Customers

NextTechBy NextTechFebruary 19, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
Faux IPTV Apps Unfold Massiv Android Malware Concentrating on Cellular Banking Customers
Share
Facebook Twitter LinkedIn Pinterest Email


Ravie LakshmananFeb 19, 2026Banking Malware / Cellular Safety

Cybersecurity researchers have disclosed particulars of a brand new Android trojan known as Massiv that is designed to facilitate machine takeover (DTO) assaults for monetary theft.

The malware, in accordance with ThreatFabric, masquerades as seemingly innocent IPTV apps to deceive victims, indicating that the exercise is primarily singling out customers in search of the net TV purposes.

“This new risk, whereas solely seen in a restricted variety of quite focused campaigns, already poses a fantastic threat to the customers of cell banking, permitting its operators to remotely management contaminated gadgets and carry out machine takeover assaults with additional fraudulent transactions carried out from the sufferer’s banking accounts,” the Dutch cell safety firm mentioned in a report shared with The Hacker Information.

ThreatFabric informed The Hacker Information through e-mail that the malware was first noticed in a marketing campaign focusing on customers in Portugal and Greece earlier this yr, though it has noticed samples courting again to the beginning of 2025 as a part of smaller take a look at campaigns.

Like varied Android banking malware households, Massiv helps a variety of options to facilitate credential theft by means of various strategies: display streaming by means of Android’s MediaProjection API, keylogging, SMS interception, and pretend overlays served atop banking and monetary apps. The overlay asks customers to enter their credentials and bank card particulars.

One such marketing campaign has been discovered to focus on gov.pt, a Portuguese public administration app that permits customers to retailer identification paperwork and handle the Digital Cellular Key (aka Chave Móvel Digital or CMD). The overlay tips customers into getting into their telephone quantity and PIN code, doubtless in an effort to bypass Know Your Buyer (KYC) verification.

ThreatFabric mentioned it recognized circumstances the place scammers used the data captured by means of these overlays to open new banking accounts within the sufferer’s title, permitting them for use for cash laundering or getting loans authorised with out the precise sufferer’s information.

As well as, it serves as a completely purposeful remote-control instrument, granting the operator the power to entry the sufferer’s machine stealthily whereas displaying a black display overlay to hide the malicious exercise. These methods, realized by abusing Android’s accessibility companies, have additionally been noticed in a number of different Android bankers like Crocodilus, Datzbro, and Klopatra.

trojan

“Nonetheless, some purposes implement safety towards display seize,” the corporate defined. “To bypass it, Massiv makes use of so-called UI-tree mode — it traverses AccessibilityWindowInfo roots and recursively processes AccessibilityNodeInfo objects.”

That is achieved in order to construct a JSON illustration of seen textual content and content material descriptions, UI components, display coordinates, and interplay flags that point out whether or not the UI ingredient is clickable, editable, centered, or enabled. Solely nodes which can be seen and have textual content are exported to the attacker, who can then decide the subsequent plan of action by issuing particular instructions to work together with the machine.

android

The malware is provided to hold out a variety of malicious actions –

  • Allow black overlay, mute sounds and vibration
  • Ship machine info
  • Carry out click on and swipe actions
  • Alter clipboard with particular textual content
  • Disable black display
  • Activate/off display streaming
  • Unlock machine with sample
  • Serve overlays for an app, machine sample lock, or PIN
  • Obtain ZIP archive with overlays for focused purposes
  • Obtain and set up APK recordsdata
  • Open Battery Optimization, System Admin, and Play Defend settings screens
  • Rquest for permissions to entry SMS messages, set up APK packages, 
  • Clear log databases on the machine

Massiv is distributed within the type of dropper apps mimicking IPTV apps through SMS phishing. As soon as put in and launched, the dropper prompts the sufferer to put in an “essential” replace by granting it permissions to put in software program from exterior sources. The names of the malicious artifacts are listed beneath –

  • IPTV24 (hfgx.mqfy.fejku) – Dropper
  • Google Play (hobfjp.anrxf.cucm) – Massiv

“In a lot of the circumstances noticed, it’s simply masquerading,” ThreatFabric mentioned. “No precise IPTV purposes had been contaminated or initially contained malicious code. Often, the dropper that mimics an IPTV app opens a WebView with an IPTV web site in it, whereas the precise malware is already put in and operating on the machine.”

The vast majority of Android malware campaigns utilizing TV-related droppers have focused Spain, Portugal, France, and Turkey over the previous six months.

Massiv is the most recent entrant to an already crowded Android risk panorama, reflecting the persevering with demand for such turnkey options amongst cybercriminals.

“Whereas not but noticed being promoted as Malware-as-a-Service, Massiv’s operator reveals clear indicators of going this path, introducing API keys for use in malware communication with the backend,” ThreatFabric mentioned. “Code evaluation revealed ongoing improvement, with extra options prone to be launched sooner or later.”

Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a world community of future-focused thinkers.
Unlock tomorrow’s traits as we speak: learn extra, subscribe to our publication, and turn into a part of the NextTech group at NextTech-news.com

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

Dutch police arrest man for “hacking” after by chance sending him confidential information

February 19, 2026

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

February 18, 2026

Operation DoppelBrand: Weaponizing Fortune 500 Manufacturers

February 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

My tech has by no means been cleaner due to this Canadian cleansing resolution

By NextTechFebruary 19, 2026

Folks could be a bit soiled generally — it’s only a truth of life. So…

Risevest secures Fund Supervisor licence from SEC

February 19, 2026

NS vans paper data to Ontario

February 19, 2026
Top Trending

My tech has by no means been cleaner due to this Canadian cleansing resolution

By NextTechFebruary 19, 2026

Folks could be a bit soiled generally — it’s only a truth…

Risevest secures Fund Supervisor licence from SEC

By NextTechFebruary 19, 2026

Risevest, a Nigerian fintech that enables customers to put money into US…

NS vans paper data to Ontario

By NextTechFebruary 19, 2026

HALIFAX – Nova Scotia Well being is trucking packing containers of Nova…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!