Thursday, April 24, 2025
HomeAndroidTgToxic Android Malware Updated it’s Features to Steal Login Credentials

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

Published on

SIEM as a Service

Follow Us on Google News

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing its ability to steal login credentials and financial data.

Originally targeting Southeast Asian users through phishing campaigns and deceptive apps, the malware has now evolved to include advanced features and expanded its geographical scope to Europe and Latin America.

Researchers have identified these updates as part of a calculated effort by threat actors to evade detection and improve operational efficiency.

- Advertisement - Google News

Advanced Techniques for Evasion and Control

The latest version of TgToxic incorporates sophisticated anti-emulation techniques designed to bypass automated analysis systems.

By analyzing Android system features, hardware specifications, and device properties, the malware can detect emulated environments commonly used by cybersecurity researchers.

It identifies discrepancies in hardware fingerprints, processor types, and emulator-specific indicators such as QEMU or Genymotion.

This ensures that the malware remains undetected in controlled testing environments.

Additionally, the malware has transitioned from hard-coded command-and-control (C2) server addresses to more dynamic methods.

TgToxic Android Malware
open directory that hosted both the dropper and main payload 

Initially, it utilized “dead drop” locations hosted on community forums, embedding encrypted configurations within user profiles.

However, this method was short-lived due to the exposure of these accounts.

The latest variant now employs a domain generation algorithm (DGA), which periodically generates new domain names for C2 servers.

According to Intel471, this approach significantly enhances resilience by making it harder for defenders to block communications.

Increased Threat

The evolution of TgToxic reflects a deliberate strategy by its operators to expand their target base beyond Southeast Asia.

By including European and Latin American banks in its list of targets, the malware demonstrates a calculated attempt to exploit new markets.

The use of public platforms for hosting malware configurations further complicates detection efforts, leveraging the legitimacy of these platforms to bypass security measures.

TgToxic Android Malware
TLDs included in the malware configuration

Moreover, the adoption of DGAs underscores the operators’ commitment to maintaining operational longevity.

Unlike static C2 addresses that can be easily neutralized, DGAs provide a dynamic mechanism for ensuring uninterrupted communication between infected devices and the malware’s control servers.

The continuous updates to TgToxic highlight the adaptability of modern cyber threats.

The operators’ ability to monitor open-source intelligence and swiftly modify their tactics poses significant challenges for cybersecurity defenses.

These developments emphasize the need for dynamic and adaptive security measures capable of countering evolving threats.

Organizations are advised to restrict app installations from unknown sources, deploy mobile threat defense solutions, and conduct regular cybersecurity training for employees.

Vigilance against excessive app permissions and proactive monitoring for indicators of compromise are crucial steps in mitigating risks associated with advanced malware like TgToxic.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

NVIDIA NeMo Vulnerability Enables Remote Exploits

NVIDIA has issued an urgent security advisory addressing three high-severity vulnerabilities in its NeMo...

Multiple Cisco Tools at Risk from Erlang/OTP SSH Remote Code Execution Flaw

Cisco has issued a high-severity advisory (cisco-sa-erlang-otp-ssh-xyZZy) warning of a critical remote code execution...

Commvault RCE Vulnerability Exploited—PoC Released

Enterprises and managed service providers globally are now facing urgent security concerns following the...

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication

Security researcher Alessandro Sgreccia (aka "rainpwn") has revealed a set of critical vulnerabilities in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

NVIDIA NeMo Vulnerability Enables Remote Exploits

NVIDIA has issued an urgent security advisory addressing three high-severity vulnerabilities in its NeMo...

Multiple Cisco Tools at Risk from Erlang/OTP SSH Remote Code Execution Flaw

Cisco has issued a high-severity advisory (cisco-sa-erlang-otp-ssh-xyZZy) warning of a critical remote code execution...

Commvault RCE Vulnerability Exploited—PoC Released

Enterprises and managed service providers globally are now facing urgent security concerns following the...