Automatically translated.View original post

FvncBot malware found can trap user typing

FvncBot malware found, can trap the printing of Android users and install more malware.

It seems that the mobility of Android is required at the expense of the risk of use, because the system is open to a variety of developers, so that hackers are "involved" in creating malware that happens, creating fear with users every day, as in this news.

According to a report by the GB website, Hackers has mentioned the detection of a malware distribution campaign of a suction type from a bank account, or a new Banking Trojan called FvncBot. This malware will focus its attacks on a group of mobile phone users on the Android operating system, which was detected by a research team from Intel 471, a cybersecurity expert organization. The research team found that the malware was detected last November in which the malware was exploded in Poland by impersonating an application of the famous bank mbank in Poland under the package "."

For technical data, the research team revealed that the FvncBot malware, which has been detected as a completely rewritten malware, does not rely on source code from the same type of malware that is popular with other malware developer hackers such as Ermac or Hook. In any way, embedded on the victim's machine is divided into two steps:

The first step is to use a fake application as a malware extension, or a Loader that claims to be an element of Google Play (Play Component) that will allow for safer and more stable use of bank applications.

The second step, after the installation is completed, the Loader will unpack the real payload files hidden within the assets of the fake application on the victim's machine.

These two components have been used as an apk0day Crypting Service to confuse the Obfuscation, allowing it to emanate on the victim's machine.

After the malware has been embedded on the victim's machine, the malware will request a Permission to access the Accessibility Mode to be used to trap the victim's typing (Keylogging). This capture is intended to steal the victim's password and sensitive information, focusing on financial information. The data collected will be stored in a Buffer memory section that can store up to 1,000 pieces of data before sending the hacker through the HTTP Request to the C2 control server or Command. And Control)

In addition, the malware is used to overlay the screen. By using WebView with the web-Injection Attacks, JavaScript is used when the victim is opening the bank application. Instead of the victim actually entering the bank app, the display on the secret grail shows a deception screen similar to the app that was opened with WebView instead to deceive the bank application password. The list of applications aimed by the malware and the URL of the phishing web display is downloaded from the C2 server and stored on the machine.

Not only that, malware also has many capabilities, including opening a channel for hackers to take control of the machine through the Web Socket. This allows hackers to scroll, click, swipe the screen freely, or even open applications to fill in the data themselves, even taking control of the data on the Clipboard. And even worse, hackers can create black screens to cover their own activities, mute or even log the victim's machine. They can also stream the screen to hackers through the MediaProjection API with the use of Codec H.264 Video Encoding.

Moreover, to make it more convenient for hackers, the malware also has a Text Mode implementation through the Virtual Network Computing (VNC) function, which stores the structure of the display on the screen through the Accessibility Mode. Recontruction is not necessary to use Screenshot.

# Welcome 2026 # Take care of yourself # Open budget # Includes IT matters # Trending

1/1 Edited to

Related posts

A young woman with long dark hair, wearing a pink satin shirt, smiles at the camera while sitting at a table. Overlay text reads: 'Tools and sites I use as a cybersecurity student to progress my skills and keep me interested in studying'.
A screenshot of 'The Hacker News' website, displaying various cybersecurity news articles from January 2025, including topics like vulnerabilities, malware, cyber espionage, and AI jailbreak methods. An ad for Zscaler and a banner for CIS Hardened Images are also visible.
A screenshot of the O'Reilly learning platform, showing various books and expert playlists related to AI, engineering, and data. Overlay text highlights the subscription cost ($50/month or $499/year) and its value for accessing books and live events.
Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

103 likes

You need TikTok ?
Here is how you can download TikTok if you need help with and apple phone just ask me I can help with Apple phone you need to change your region on the Apple Pay store
Ali

Ali

10 likes

It's no secret that Karol G just slayed the #Grammys #Glambot . #AwardsSeason
user6854050772614

user6854050772614

7 likes

3 cybersecurity jobs that pay well
1. Security Analyst - What They Do: Monitor networks for vulnerabilities, investigate breaches, and implement security measures. - How to Start: - Obtain certifications like CompTIA Security+ or CySA+. - Gain experience with tools like SIEM (e.g., Splunk). - Start in an I
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

629 likes

A colorful Disney tattoo of Stitch from Lilo & Stitch on an arm, featuring a watercolor-style blue and purple splatter background. The character is depicted with a wide, happy grin and outstretched arms, showcasing a vibrant and playful design.
A Disney tattoo on an arm featuring Thumper from Bambi, sitting among purple and blue flowers and tall grass. The tattoo includes the text "Macushla R.I.P. Johnny" below the character, rendered in a traditional tattoo style.
A traditional-style Disney tattoo on a leg depicting Esmeralda from The Hunchback of Notre Dame. She is shown in a flowing purple dress, holding a large crescent moon or hoop, surrounded by golden stars. The text "From my flash! Tiny blast over" is visible.
🏰✨Disney Tattoos✨🏰
Did you know, I’m a HUGE Disney nerd! It’s always a treat whenever I get to do something based on Disney, small or big, flash or custom 🥰 Here’s just a small compilation of some of my favorites! #disney #disneytattoo #tattoo #tattooartist #traditionaltattoo
Malware 🔜 FC

Malware 🔜 FC

375 likes

Developing a career in cybersecurity
Hey All! 👋 Want to stay safe online and protect your data? Cybersecurity knowledge is essential. It helps you secure your personal information and understand how to safeguard your digital footprint. Let’s dive into why it’s crucial! 💻🔒 Why Cybersecurity Matters Cybersecurity is about protecting
Meghana

Meghana

547 likes

Why I switched to taking notes on my iPad
I used to love writing in notebooks, but after switching to my iPad, I can confidently say I’m never going back! Here’s why: ✨ Cuter Notes – Let’s be real…aesthetic notes make studying more enjoyable! I can use custom colors, cute stickers, and different handwriting styles to make my notes visua
Rebecca R.

Rebecca R.

262 likes

😫 Wanting to quit your 9-5?
Becoming a Pinterest Manager might be for you! In less than a year, I went from earning $2K at my 9-5 to over $4K/month with Pinterest management alone. Now, with all the different skills and platforms I lesrned, I make anywhere from $12-15K A MONTH! Back then, I knew I had to do something
Bria | Social, Design, & AI

Bria | Social, Design, & AI

482 likes

⚡ How to Make Your PC Run Faster – 5 Easy Tips! 🖥️🔥
💡 1. Disable Startup Programs 🚀 Too many apps launching at startup slow down your PC! ✅ Open Task Manager (Ctrl + Shift + Esc) ✅ Go to the Startup tab ✅ Disable unnecessary apps to speed up boot time 💡 2. Clean Temporary Files 🗑️ Over time, junk files slow your system down. ✅ Press Win
skaeszun

skaeszun

284 likes

+it’s less than 80$✨❗️LINK for this item in my bio❗️
Details⬇️: This flip phone smartphone with a flip keyboard design, offering both the convenience of a traditional keypad and the functionality of a modern touchscreen device. With 4GB of internal storage, you'll have plenty of space for apps, photos, and more. The compact 3.5" displa
Atlas

Atlas

443 likes

A Ben 10 gym audio for you. #fyp #gym #ben10 #ben10omniverse #audio
IzzyywiththeZ

IzzyywiththeZ

0 likes

Top Cybersecurity Certificates
There are several reputable cybersecurity certifications that can help you advance your skills and knowledge in the field of cybersecurity. 1. Certified Information Systems Security Professional (CISSP): - CISSP is a globally recognized certification that covers a wide range of cybersecurit
anjali.gama

anjali.gama

110 likes

Malicious Android App
Cybercriminals are using fake ATT apps to distribute malware #cybersecurity #Android
Lemon8er

Lemon8er

0 likes

A person with long dark hair and a straw hat walks through a sunny public square. Overlay text reads "CYBERSECURITY CAREER Tips to get started," introducing advice for a career in cybersecurity.
A person in a white dress walks on a path next to green bushes. Overlay text advises to "Build a Strong Technical Foundation" by learning networking basics, operating systems, and scripting languages.
People walk across a street with benches and trees in the background. Overlay text suggests to "Get Hands-On Experience" through CTF competitions, cybersecurity challenges, and setting up a home lab.
Tips for pursuing a career in cybersecurity
1. Build a Strong Technical Foundation A solid understanding of systems, networks, and programming is essential for identifying and mitigating security threats. • Learn networking basics (e.g., TCP/IP, firewalls, VPNs). • Gain familiarity with operating systems (Windows, Linux)
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

129 likes

productivity apps on your mac!
Proton VPN for staying secure online and Grammarly for making sure I don’t send embarrassing emails literally two apps I use daily to stay productive without the stress. If you’re not using them yet, you’re missing out! #lemon8partner #lemon8creator #tech #apps #productivity
asmae🐸

asmae🐸

19 likes

ERROR ERROR ERROR ERROR ERROR
🔺️!!!Flashy!!!🔺️ Um guys... Something is definitely wrong with my tablet 😬😨 #rewritesonic #malware #sonicexe #sonicthehedgehog #sonicfanart
EmK & Fidgi

EmK & Fidgi

2 likes

Journal Spreads ive done recently
okay its been a few months but so far i did great with all the stickers i love buyings stickers now as a comfort thing idk how to say it ig? but overall my journal spreads look so good so far i hope yall like it js as much as i do<3 anywho im waiting for an upcoming concert to add i cant wait to
mal<3

mal<3

162 likes

#evakuasi #sidoajo #fyp
abesso

abesso

1 like

@MrrDaVinci I assume you’ve seen this? #geopolitics #cybersecurity #axios #techtok #uhoh
WakoGeek

WakoGeek

0 likes

Elite Hacker Destroyed His Empire By Forgetting On
Bro, I really forgot to use a VPN 💀 #hacker #cybercrime #fail #tech #arrestedstupidly
arrestedstupidly

arrestedstupidly

1 like

The Guy Who Invited Me for a Grimace Shake Wasn’t a Student
COPS US

COPS US

1 like

Check out this website that helps you when you’re feeling uninspired! I walk you thru the process of downloading the svg file to taking it to cricut design space! Happy crafting. #designinspo #creativeart #cricutprojects #svgfiles #CricutTips
VlunaWorks

VlunaWorks

36 likes

Kpop boy groups I stan
I'm a kpop Stan so I decided to show which boy groups I Stan #kpop #straykids #ENHYPEN #tomorrowxtogether #ateez #SEVENTEEN #p1harmony
Susan

Susan

1 like

In this img, I strip back the layers of a malware
STOP installing random .exe files! 🛑 This 'Physics Simulator' is actually malware in disguise. See how it hooks your keyboard in the background. Tag a friend who downloads too many mods. #cybersecurity #scamalert #keylogger
ShadowRoot17

ShadowRoot17

1 like

Solved: exFAT Drive Not Recognized in Windows 10
Why exFAT drive not recognized in Windows 10/11 and what’s the best solution to it? Read the following post to get the answers. #drive #filesystem #recognized
Techcrafter

Techcrafter

0 likes

Recover Hidden Files from USB Using Command Prompt
Can’t see your files on a USB stick even though they’re there? This video shows how to use Command Prompt commands (like attrib) to unhide files hidden by system attributes or viruses — plus what to try if that doesn’t work. #USB #cmdanks #windows 11 #techtutorial #newonlemon8
XanthusTechCore

XanthusTechCore

2 likes

Quotes I find relatable 🤌💋
#relateable #allfoodsfit #LoveYourself #yourbeautiful #sunday #yougotthis
Haze💝

Haze💝

22 likes

#creatorsearchinsights #therapeutictiktok #somatichealing #storedtrauma #yellowstonetv
Rawr xD Yuna🌙The.Terror.

Rawr xD Yuna🌙The.Terror.

0 likes

SOS!!! Wha do you do if you click a phishing email link… two times?!? So far I have: 1, added two factor sign on 2, changed my passwords 3, stress cried and spiraled But for real. What do you do… how do I know if there is now malware (? Is that what it’s called ?) living on my computer?!?
Alexandra Wildeson

Alexandra Wildeson

2 likes

External Hard Drive Showing Empty? How to Fix?
Plugged in your external hard drive but found it empty? Here are a few easy fixes you can try! If your files are lost, use AOMEI FastRecovery to bring them back. Giveaway license code: code.aomeitech.com Discount code: Special30OFF  #externalharddrive #recovery #harddrive #empty
SmoothTechie

SmoothTechie

1 like

A person points at a computer screen displaying various app icons and text like "Customize your AI chats with this tool TypingMind" and "The best of Setapp". Overlays read "Tech tips", "Netflix of Productivity", and "Mac Edition!".
Against a lake background, two app icons are shown: CleanMyMac and Paste. Text describes CleanMyMac for tidying Macs and Paste as a clipboard for saving copied content.
Against a lake background, two app icons are shown: TextSniper and Ulysses. Text describes TextSniper for extracting text from visuals and Ulysses for writing and publishing.
Mac Productivity Apps: Make More Time for YOU! 💻
Let’s talk about one of the most important things in our daily routines—our workflow. Whether you’re working for yourself, managing a side hustle, or simply trying to keep everything in check, examining and refining your workflow is key to getting more done with less stress. 💪 By finding simple, ef
Cas Lin

Cas Lin

35 likes

What to offer as a SMM? 📲
Knowing that my days/weeks are never 100% the same makes me happy! Including client work, I also: 📱I assisted an e-commerce startup by sharing my marketing tips with them so they have a successful launch! 📱Created and designed business cards for a local company. 📱And also had someone re
Bria | Social, Design, & AI

Bria | Social, Design, & AI

12 likes

Oscar Esparza Hacker

Oscar Esparza Hacker

0 likes

Indiana Mish (meesh)

Indiana Mish (meesh)

0 likes

Never plug your phone or computer into usb plugs in hotels or airports here’s why 👇🏼 A USB port doesn’t just deliver power, it can also transfer data. A compromised hotel USB outlet could secretly install malware on your phone or copy your data without you realizing it. Hotels, airports, and o
Cybersecurity Girl

Cybersecurity Girl

147 likes

F*** Fans Drake Remix
#drake #rnbvibes #newmusic #certifiedloverboy #remix
7Taji7

7Taji7

0 likes

⚠️ Do NOT run this .exe file or else Liam Neeson will find ya #interesting #filspixel #storytime #computer #fypシ #malware #wannacry #windows #fyp #foryoupage #foryou #trojan #virus #tiktok #viral
yulianavilla

yulianavilla

0 likes

A hand holds a pink iPhone with text 'Tech 101 For Beginners' and 'Tips to help Non-Tech Savvy Users,' accompanied by laptop and phone app icons, against a brick background.
A pink iPhone in its box, illustrating the tip to 'Keep Your Devices Updated' with text explaining why updates help and advising to enable automatic updates.
An iPhone screen displaying app icons and display settings, accompanying the tip to 'Use Strong, Unique Passwords' with reasons why and advice on using combinations and password managers.
Tech Hacks For Beginners 📲💻😬
I have some great tips for non-tech savvy tech users. I know these tips will help you learn your tech more quickly and effectively. 1. Keep Your Devices Updated Why It Helps: Updates often contain security patches and improvements that help your device run smoothly. Tip: Enable automatic updat
Joy 📚

Joy 📚

282 likes

5 FREE apps to write a novel
These are my top free apps that I use almost daily when writing and promoting my debut. Each of these has paid plans if you want to utilize all the available features. For now, I’m satisfied with the free versions of these. I do pay for a video editor though😅 Which one is your favorite? Which
Iryna Karban

Iryna Karban

191 likes

✨ Stand out during the holidays with this combo!
Tonight's combo is one that will make you stand out. Key notes: Honey, vanilla, amber. With a light hint of tobacco. 💌 Brand: @TheTipsyGoatSoapCompany Honey Toffee 💌 Brand: @Jebouri | Arabian Perfumery honey amber 💌 Brand: @Guerlain Tobacco Honey #عطر #عطور #perfumetiktok #
✨it's malware✨

✨it's malware✨

1 like

virus
👍Pros :
F3X

F3X

1 like

A laptop displays the NordVPN website, showing 'Security status Protected' and a map of the United States, illustrating the best VPN service for secure browsing.
A laptop screen shows an error message on Max, 'This Is Uncharted Territory,' indicating content is not available in the region, highlighting accessibility issues when traveling.
A laptop displays a VPN app interface with a list of countries like Italy and United States, demonstrating access to all regions worldwide for as low as $3.99/month.
the best VPN for all your needs!
NordVPN is a great tool to have if you want to access all websites from any region! (traveling or not). It keeps your connection secure on public Wi-Fi, protecting your data from hackers. Plus, it lets you access academic resources or websites that might be restricted in certain countries if you ar
Anaïs D’Ottavio

Anaïs D’Ottavio

12 likes

See more