Something new is targeting Android users, and here's why it matters

A newly discovered Android malware is spreading quietly, but simple habits can keep you safe.

1comment
We may earn a commission if you make a purchase from the links on this page.
Something new is targeting Android users, and here's why it matters
Android users now have two new malware families to be aware of. Cybersecurity experts are now disclosing FvncBot and SeepSnatcher, while a ClayRat upgrade has also been spotted in the dark corners of the internet.

New Android malware to be careful with has been discovered


The three cybersecurity findings come from Intel 471, CYFIRMA, and Zimperium

Surfshark VPN: 88% off 24-month subscription

€61 83
€484 65
€423 off (87%)
Grab the Surfshark One VPN subscription for 24 months, and you can now save 87%. The subscription costs just €2.29/mo, or €61.83 for 27 months. Why 27? Because you're getting three extra months! Don't miss out.
Buy at Surfshark

FvncBot: banking malware


Let's start with FvncBot. This is malware that poses as a security app developed by mBank. Its target: mobile banking users in Poland. This malware is reportedly not based on other Android banking Trojans that have had their source code leaked, and it appears to be completely written from scratch.


The malware rocks features like keylogging (by taking advantage of Android's accessibility services), web-inject attack capabilities, screen streaming, and even hidden virtual network computing (HVNC). According to Intel 471, the malware is doing all of that to commit successful financial fraud. 

Recommended For You

The malware is protected by a crypting service known as apk0day, offered by Golden Crypt. This is a malicious app acting like a loader and installing the malware.

Once the app is launched, you are prompted to install a Google Play component to "ensure the security and stability of the app". Obviously, that's not what happens; instead, the malware gets deployed on your phone. This approach has been used by other malicious apps to bypass the accessibility restrictions on Android phones with Android 13 and later.

According to researchers, Poland is the targeted country of this malware, and it appears to be in an early stage of development. 

The malware asks the user to grant it accessibility services permission. Once done, it operates with elevated privileges, connects to an external server, and registers the infected device. Then, it receives commands. 

Here are some of its reported functions:
  • Remote control of the device (swiping, clicking, scrolling)
  • Access to the list of installed apps 
  • Access to device info and bot configuration 
  • Show a full-screen overlay to capture and exfiltrate sensitive data
  • Hide the overlay
  • Check accessibility services status
  • Log keystrokes using accessibility services
  • Stream screen content 

And if that's not enough, it can also inspect the device's screen and content, even if an app prevents screenshots from being taken. 

At the moment, it's not known how the malware gets around. Usually, people get infected by Android banking trojans via SMS phishing or third-party app stores.  

Of course, right now, this malware is targeting users in Poland, but that doesn't mean that its makers are not going to target other regions as well.

SeedSnaptcher: cryptocurrency theft 


SeedSnaptcher is currently distributed under the name Coin through Telegram. It's designed to enable the theft of cryptocurrency. The malware can also intercept incoming SMS messages and steal two-factor authentication codes. Of course, with that, it can take over accounts. Apparently, the malware is also capable of capturing device data, files, call logs, contacts, and sensitive data by displaying an overlay on your display.

Reportedly, the operators of SeedSnatcher are China-based or Chinese-speaking (Chinese language instructions are shared via Telegram). 

Meanwhile, there's also an improved version of ClayRat out and about. 

Have you ever installed an app from outside the Google Play Store?


ClayRat has been updated 



Apparently, there's also an updated version of ClayRat roaming around. The update allows the malware to abuse accessibility services and exploit its SMS permissions. With this new version, it's a more serious security threat and can now record keystrokes, show you overlays looking like a system update screen to hide its activity, and create fake notifications. 

Basically, this allows for the ability of full device takeover by abusing accessibility services. It can automate unlocking the device, screen recording, gathering notifications, and showing you overlays. 

The malware is distributed via 25 fraudulent phishing domains. These domains impersonate legitimate websites such as YouTube (advertising a Pro version). 

How to protect yourself from Android malware


Staying safe on Android is mostly about a few simple habits. First, only download apps from the Google Play Store or trusted sources – most of these malware cases come from random links, fake apps, or Telegram downloads. Also, never install something just because a pop-up says it's "required for security." Real apps don't behave like that.

Keep your phone updated, avoid clicking links in strange SMS messages, and be careful with apps asking for accessibility permissions – that's the number-one trick these malware families use. If something feels off, just cancel it. And of course, using two-factor authentication apps (not SMS) makes things much safer.

Basic caution goes a long way


In my opinion, this stuff is scary, mostly because it all starts with one quick tap on the wrong link. The good news is that basic caution really does go a long way. As long as you stick to official app stores and don't grant big permissions to apps you don't trust, you're already much safer than most people. Honestly, the "too good to be true" downloads are the ones that always get you – so I'd rather skip them and keep my phone clean.
Google News Follow
Follow us on Google News
COMMENTS (1)

Latest Discussions

by RxCourier9534 • 12
by MagentaMarx • 11

Recommended For You

FCC OKs Cingular\'s purchase of AT&T Wireless