Android Malware¶
The Android malware landscape from its earliest trojans to modern banking malware with full device takeover. This section documents how Android malware works, how it evolved, and the techniques that define each generation.
Structure¶
| Page | Content |
|---|---|
| Timeline | Chronological evolution of Android malware: key families, milestones, how techniques spread |
| Naming Conventions | How different security vendors name the same malware, and how to map between naming schemes |
| Grayware & Data Harvesting | Data broker SDKs, stalkerware, ad fraud, fleeceware, predatory lending apps -- the gray area between aggressive monetization and malware |
| Threat Actors | MaaS operators, state-sponsored groups, regional criminal organizations, and solo developers behind Android malware |
| Families | Individual write-ups on notable malware families: behaviors, permissions, techniques, packers, IOCs |
Key Insight
Accessibility Service abuse is nearly universal in modern banking trojans and is the single most critical permission for malware operations. It enables overlay injection, keylogging, ATS fraud, screen reading, and self-granted permissions -- making it the foundation that most other attack techniques depend on.
Landscape Overview¶
By Category¶
| Category | Count | Description |
|---|---|---|
| Banking trojans (MaaS) | 25+ | Overlay attacks, ATS, VNC/DTO. Sold as subscriptions ($3k--$10k/month) |
| Regional bankers | 10+ | Single-country targeting with local financial system knowledge |
| SMS/toll fraud | 5+ | Premium SMS, WAP billing, subscription fraud |
| Spyware/surveillance | 15+ | State-sponsored and commercial. Screen capture, keylogging, targeted deployment |
| RATs | 5+ | General-purpose remote access. Builder-based or open-source |
| Supply chain | 3+ | Malicious SDKs, compromised apps. Dynamic code loading via Play Store |
| Crypto stealers | 3+ | OCR seed phrase theft, clipboard hijacking |
Major Lineages¶
Android malware families frequently share code through source leaks, MaaS rebranding, and direct evolution:
graph LR
Cerberus["Cerberus (2019)"] -->|leak| Alien["Alien (2020)"]
Alien -->|fork| Ermac["Ermac (2020)"]
Ermac -->|evolve| Hook["Hook (2022)"]
BankBot["BankBot (2016)"] -->|influence| Anubis["Anubis (2018)"]
Anubis -->|leak| GodFather["GodFather (2022)"]
Exobot["Exobot (2016)"] --> ExobotCompact
ExobotCompact --> Coper
Coper --> Octo["Octo (2022)"]
Octo --> Octo2["Octo2 (2024)"]
GMBot["GM Bot (2014)"] -->|leak| Overlay["overlay technique adopted industry-wide"]
BRATA["BRATA (2019)"] -->|evolve| Copybara["Copybara (2021)"]
Copybara --> ToxicPanda["ToxicPanda (2024)"]
CraxRAT --> SpySolr
SpySolr --> BTMOB["BTMOB RAT (2025)"]
2024-2025 Trends¶
| Trend | Examples |
|---|---|
| Reduced permission footprints | Medusa v2 dropped from 21 to 5 permissions |
| NFC relay attacks | NGate, RatOn clone contactless payment cards |
| OCR-based crypto theft | SparkCat, SpyAgent scan photos for seed phrases |
| Commercial packer adoption | Klopatra, Gigabud use Virbox for anti-analysis |
| On-device virtualization | GodFather v3 installs real banking apps inside VirtualApp sandbox |
| Fake lockscreen PIN capture | TrickMo, TsarBot steal device PINs via fake lockscreens |
| Human behavior mimicry | Herodotus types with natural delays to evade behavioral biometrics |
| Firebase as C2 | KoSpy, FireScam, DeVixor use Firebase infrastructure |
Most Impactful Trend
NFC relay attacks represent a paradigm shift -- malware like NGate and RatOn can clone contactless payment cards remotely, bridging the gap between digital compromise and physical-world fraud at ATMs and POS terminals.
Geographic Hotspots¶
| Region | Dominant Families | Distribution |
|---|---|---|
| Europe (Western) | Anatsa, Octo, Medusa, Vultur | Play Store droppers |
| Europe (Southern) | Copybara, Sturnus, Herodotus | Vishing (TOAD), smishing |
| Turkey | Frogblight, BlankBot, Klopatra | Smishing, phishing pages |
| Russia/CIS | Mamont, FireScam | Fake parcel tracking, fake RuStore |
| Iran | DeVixor, DCHSpy | Fake VPN apps, automotive phishing |
| South Korea | Fakecalls, SoumniBot, SpyAgent | Smishing, fake banking apps |
| East Asia | MoqHao, FluHorse | Smishing (Roaming Mantis), trojanized apps |
| Southeast Asia | Gigabud, GoldPickaxe | Fake government/banking apps |
| India | SpyLoan, regional banking trojans | Fake loan apps, MaaS phishing platforms, smishing |
| Latin America | PixPirate, ToxicPanda, Zanubis | WhatsApp lures, social engineering |
| Middle East | GuardZoo, AridSpy | Trojanized messaging apps |
Detailed Lineage Maps¶
Banking Trojan Evolution¶
The banking trojan ecosystem is defined by source code leaks and direct inheritance. The Cerberus leak in September 2020 was the single most impactful event, seeding three successor families.
graph TD
subgraph Cerberus Lineage
Cerberus["Cerberus<br/>(2019)"] -->|"source leak<br/>Sept 2020"| Alien["Alien<br/>(2020)"]
Alien -->|"fork by DukeEugene"| Ermac["ERMAC<br/>(2021)"]
Ermac -->|"evolve + VNC"| Hook["Hook<br/>(2022)"]
Hook -->|"v2 + WebSocket"| HookV2["Hook v2<br/>(2023)"]
end
subgraph Exobot Lineage
Exobot["Exobot<br/>(2016)"] -->|"lite version"| ExobotCompact["ExobotCompact<br/>(2019)"]
ExobotCompact -->|"rebrand"| Coper["Coper<br/>(2021)"]
Coper -->|"rebrand by ThreatFabric"| Octo["Octo<br/>(2022)"]
Octo -->|"DGA + encrypted C2"| Octo2["Octo2<br/>(2024)"]
end
subgraph Anubis Lineage
GMBot["GM Bot<br/>(2014)"] -->|"overlay concept"| BankBot["BankBot<br/>(2016)"]
BankBot -->|"influenced"| Anubis["Anubis<br/>(2018)"]
Anubis -->|"source leak 2019"| GodFather["GodFather<br/>(2022)"]
GodFather -->|"VirtualApp sandbox"| GodFatherV3["GodFather v3<br/>(2024)"]
end
subgraph BRATA Lineage
BRATA["BRATA<br/>(2019)"] -->|"evolved by same actor"| Copybara["Copybara<br/>(2021)"]
Copybara -->|"rebranded for LATAM"| ToxicPanda["ToxicPanda<br/>(2024)"]
end
subgraph Independent Lines
Medusa1["Medusa v1<br/>(2020)"] -->|"reduced permissions"| Medusa2["Medusa v2<br/>(2024)"]
Xeno1["Xenomorph v1<br/>(2022)"] -->|"added ATS"| Xeno2["Xenomorph v2"] -->|"ATS engine"| Xeno3["Xenomorph v3<br/>(2023)"]
Vultur1["Vultur v1<br/>(2021)"] -->|"added screen streaming"| Vultur2["Vultur v2<br/>(2024)"]
CraxRAT --> SpySolr --> BTMOB["BTMOB RAT<br/>(2025)"]
end
Spyware Evolution¶
Commercial and state-sponsored spyware follows a different lifecycle. Distribution is targeted (not mass), capabilities are deeper (kernel-level), and operators face legal consequences.
graph TD
subgraph Commercial Spyware
FinSpy["FinSpy<br/>(2012, FinFisher)"] -->|"bankrupt 2022"| FinSpyEnd["Operations ceased"]
Pegasus["Pegasus<br/>(2016, NSO Group)"] -->|"ongoing"| PegasusCurrent["Active<br/>zero-click exploits"]
Predator["Predator<br/>(2019, Cytrox)"] -->|"Intellexa consortium"| PredSanctions["US sanctions<br/>March 2024"]
PredSanctions -->|"fragmented ops"| PredContinue["Infrastructure rotating"]
Hermit["Hermit<br/>(2019, RCS Lab)"] -->|"ISP-level delivery"| HermitActive["Active in Italy, Kazakhstan"]
end
subgraph State-Sponsored
APT41["APT41<br/>(China)"] -->|"cross-platform"| LightSpy["LightSpy<br/>(2020)"]
LightSpy -->|"14+ plugins"| LightSpyV2["LightSpy v2<br/>(2024)"]
ScarCruft["ScarCruft/APT37<br/>(DPRK)"] --> KoSpy["KoSpy<br/>(2024)"]
Gamaredon["Gamaredon/Sandcat<br/>(Russia)"] --> BoneSpy["BoneSpy<br/>(2021)"]
Gamaredon --> PlainGnome["PlainGnome<br/>(2024)"]
end
SMS Worm and Toll Fraud¶
SMS-based malware peaked around 2020-2022 with FluBot's worm-like spreading mechanism. Law enforcement intervention proved effective in this category.
graph LR
FluBot["FluBot<br/>(2020)"] -->|"SMS worm spread<br/>across Europe"| FluBotPeak["Peak: 2021<br/>11 countries"]
FluBotPeak -->|"Europol takedown<br/>June 2022"| FluBotEnd["Dead"]
Joker["Joker<br/>(2017)"] -->|"continuous<br/>Play Store presence"| JokerOngoing["Active<br/>1,700+ variants"]
MoqHao["MoqHao<br/>(2018, Roaming Mantis)"] -->|"expanded to<br/>27 languages"| MoqHaoV2["Auto-execute<br/>variant (2024)"]
Source Code Leaks¶
Source code leaks fundamentally reshape the threat landscape. A single leak can spawn multiple successor families and reduce the barrier to entry for new operators.
| Date | Family | What Happened | Impact |
|---|---|---|---|
| 2017 | GM Bot | Source leaked on underground forums | Pioneered overlay technique; code reused across dozens of families |
| 2019 | Anubis | Source code leaked after developer arrest | Enabled GodFather and numerous low-tier forks targeting specific regions |
| Sept 2020 | Cerberus | Developer failed to auction, released source free on forums | Most impactful Android malware leak. Seeded Alien, ERMAC, Hook. ThreatFabric documented the cascade |
| 2021 | SpyNote | Builder leaked publicly | Explosion of SpyNote variants; accessible to low-skill operators. Zimperium tracked post-leak proliferation |
| 2022 | BRATA | Partial source circulated | Influenced Copybara development |
| 2023 | Rafel RAT | Open-source release | Check Point documented 120+ campaigns across 10 threat actors using Rafel RAT |
| 2024 | CraxRAT | Builder sold then leaked | Led to SpySolr fork, then BTMOB RAT |
Law Enforcement Actions¶
Law enforcement actions against mobile malware are rare but impactful when they occur. Most "takedowns" are Google removing apps from the Play Store after vendor publications.
| Date | Operation | Target | Outcome | Source |
|---|---|---|---|---|
| June 2022 | Europol/Dutch Police | FluBot infrastructure | Infrastructure seized across 11 countries. FluBot did not resurface. One of the most successful mobile malware takedowns. | Europol |
| 2022 | German authorities | FinFisher GmbH | FinSpy vendor filed bankruptcy after investigation into sales to authoritarian regimes. Operations ceased. | Netzpolitik.org |
| March 2024 | US Treasury OFAC | Intellexa Consortium | Sanctions on entities and individuals behind Predator spyware. First financial sanctions targeting a commercial spyware vendor. | US Treasury |
| March 2024 | Joint (FBI/Europol) | Blackphone encrypted network | Infrastructure used by multiple Android malware operators. Disrupted but not fully dismantled. | Europol |
| 2024 | Google TAG + Mandiant | Predator infrastructure | Technical disruption of Predator delivery infrastructure and exploit chains. Intellexa fragmented to new hosting. | Google TAG |
By Behavior¶
Malware families are also cross-referenced from Attack Techniques based on observed behaviors: overlay attacks, accessibility abuse, SMS interception, NFC relay, etc. Permission pages document which families abuse each Android permission.