Monday, April 14, 2025
HomeAndroidNew Android Malware “TsarBot” Targeting 750 Banking, Finance & Crypto Apps

New Android Malware “TsarBot” Targeting 750 Banking, Finance & Crypto Apps

Published on

SIEM as a Service

Follow Us on Google News

A newly identified Android malware, dubbed TsarBot, has emerged as a potent cyber threat targeting over 750 applications across banking, finance, cryptocurrency, and e-commerce sectors.

Discovered by Cyble Research and Intelligence Labs (CRIL), this banking Trojan employs sophisticated overlay attacks to steal sensitive user credentials, including banking details, login information, and credit card data.

Global Reach and Advanced Techniques

TsarBot’s operations span multiple regions, including North America, Europe, Asia-Pacific, and the Middle East.

- Advertisement - Google News

The malware spreads via phishing sites that impersonate legitimate financial platforms.

Once installed on a victim’s device through a dropper disguised as Google Play Services, TsarBot activates overlay attacks by displaying fake login pages over legitimate apps.

Android Malware
Phishing site distributing TsarBot

This technique enables it to capture sensitive user data seamlessly.

Beyond overlay attacks, TsarBot demonstrates advanced capabilities such as screen recording and remote control of infected devices.

It can simulate user actions like swiping and tapping while concealing malicious activities using a black overlay screen.

Additionally, the malware employs lock-grabbing techniques to capture device PINs or passwords using fake lock screens.

Command-and-Control Mechanism

TsarBot communicates with its command-and-control (C&C) server via WebSocket connections across multiple ports.

According to the Report, these connections facilitate the transmission of stolen data and enable dynamic execution of fraudulent activities on the victim’s device.

Commands issued by the server allow the malware to manipulate screen controls, execute gestures, and interact with targeted apps.

Android Malware
Screen capture service

The malware maintains a list of targeted application package names retrieved from its C&C server.

These include banking apps from countries like India, France, Poland, and Australia, as well as cryptocurrency platforms and social media applications.

When users interact with these apps, TsarBot overlays phishing pages that mimic legitimate interfaces to trick victims into entering their credentials.

The stolen data is then transmitted back to the C&C server for exploitation.

TsarBot’s ability to target a vast array of applications highlights the growing sophistication of Android banking Trojans.

By leveraging Accessibility services and advanced communication protocols, it executes on-device fraud while remaining undetected.

Cybersecurity experts recommend users exercise caution when installing apps from untrusted sources and avoid interacting with suspicious links or phishing sites.

Enabling Google Play Protect and regularly updating devices can also mitigate risks associated with such threats.

This development underscores the persistent challenge posed by mobile malware in today’s interconnected digital landscape.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular...

Chinese APT Group Targets Ivanti VPN Vulnerabilities to Breach Networks

In a concerning report from cybersecurity firm TeamT5, it has been revealed that a...

VMware ESXi 8.0 Update 3e Is Now Free — Here’s What’s New

VMware has announced that ESXi 8.0 Update 3e, the latest version of its industry-leading hypervisor,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular...

Chinese APT Group Targets Ivanti VPN Vulnerabilities to Breach Networks

In a concerning report from cybersecurity firm TeamT5, it has been revealed that a...