Automatically translated.View original post

Fake cybersecurity app. Use Hugging Face.

Fake cybersecurity app. Use AI app deposit "Hugging Face," release malware down Android.

In this cybersecurity era, users of IT devices such as computers or smartphones are often interested in downloading cybersecurity applications for protection, and that is also a vulnerability for hackers to impersonate.

According to a report by the website Phone World, it has mentioned the detection of a malware release campaign of remote control of the victim's machine or the RAT (Remote Access Trojan) by secretly claiming to be a cybersecurity application for the Android operating system called TrustBastion that claims to have a lot of cyber detection capabilities - fake ads, short messages (SMS or Short Message Service), scams, phishing scam attempts, and various types of malware. But in reality, this fake app instead acts as a dropper to download malware (payload) files of RAT malware. Such came down installed on the machine.

The source does not say where the start of the scam to download and install this fake application started, but it is expected that it may come from a fake advertisement that tricked you into downloading an application for a 3rd Party Android smartphone. After downloading and installing it, the fake app will contact a server on the URL called trustbastion [.] com. After reaching the server, the server will redirect to the digital library (Repo or Repository) called "Hugging Face," which Repo is usually a trusted service. Yes, and often used to deposit artificial intelligence or AI projects, but hackers can use it as a source of malware.

The malware retrieves the payload files of the RAT malware from Hugging Face via the Content Delivery Network. The CDN system is also a Hugging Face system. In this way, the malware can evade detection. In addition, a research team from Bitdefender, an anti-malware developer company, found that the server's Polymorphism system is used to modify subvariants of malware every 15 minutes to effectively evade detection from the victim's system. Up.

The RAT malware is not listed in any way, but the research team has described that the malware is focused on stealing data such as passwords from financial services such as Alipay and WeChat. Using the Overlayt Attack technique to trick victims into entering passwords on fake screens. In addition, it is also used to steal screen unlock codes. The research team also revealed that the malware will take control of the victim's machine through the Disabled User Support or Accessibility Mode to use the ability to steal data as follows:

Screen stacking system, as mentioned above.

Screen capture (Screenshot)

Simulation of scrolling screen and pressing (Tap) screen

Uninstallment Protection

Monitor the victim's behavior.

And to create even greater consistency, malware also loads content like real apps from the control server (C2 or Command and Control) to deceive victims.

In order to combat this campaign, the research team collaborated with Hugging Face to successfully delete malware payload files from the system. It also advised mobile phone users to use them safely. The instructions are as follows:

Avoid downloading applications from 3rd Party download sources.

Beware of security warnings from unusual-looking applications.

Review requests for permissions and be careful with every approval.

Install updates of the application only through the official channel.

# Trending # Lemon 8 Howtoo # lemon 8 diary # huggingface # freedomhack

2/19 Edited to

... Read moreเรื่องนี้เป็นตัวอย่างหนึ่งที่สะท้อนให้เห็นว่าแฮกเกอร์ยุคใหม่ใช้เทคนิคซับซ้อนมากขึ้นเรื่อย ๆ ในการแพร่มัลแวร์ ทำให้แอปปลอมสามารถหลบหนีการตรวจจับโดยระบบความปลอดภัยทั่วไปได้โดยง่าย จากประสบการณ์ส่วนตัวในการใช้สมาร์ทโฟนและดาวน์โหลดแอปพลิเคชัน จะพยายามเลือกติดตั้งเฉพาะแอปจาก Google Play Store เท่านั้น เพราะระบบมีมาตรการตรวจสอบความปลอดภัยที่เข้มงวดมากกว่าการดาวน์โหลดจากแหล่ง 3rd Party ที่ขาดการควบคุม นอกจากนี้ ยังแนะนำให้ผู้ใช้สังเกตคำขอสิทธิ์ของแอปต่าง ๆ อย่างละเอียด หากแอปขอสิทธิ์ที่ไม่สมเหตุสมผล เช่น ขอสิทธิ์เข้าถึง SMS หรือ Accessibility Mode โดยไม่เกี่ยวข้องกับฟังก์ชันหลัก ควรพิจารณาให้รอบคอบก่อนติดตั้ง แอปปลอม TrustBastion นั้นใช้วิธีการซ้อนหน้าจอ (Overlay Attack) เพื่อหลอกขโมยรหัสผ่านและข้อมูลสำคัญต่าง ๆ ซึ่งมีความอันตรายอย่างยิ่ง เพราะผู้ใช้ไม่ได้รับรู้ว่าได้ถูกหลอกเพราะเห็นเพียงหน้าจอปลอมที่เหมือนแอปจริง วิธีป้องกันที่ดีที่สุดคือหลีกเลี่ยงการคลิกลิงก์หรือโฆษณาที่ดูไม่น่าเชื่อถือ และอย่าดาวน์โหลดแอปโดยตรงจากลิงก์ที่ไม่ทราบแหล่งที่มา อีกข้อแนะนำคือ ควรติดตั้งอัปเดตระบบปฏิบัติการและแอปพลิเคชันอย่างสม่ำเสมอ เพราะนักพัฒนาจะปล่อยแพตช์แก้ไขช่องโหว่และพัฒนาระบบความปลอดภัยให้ทันสมัยเสมอ รวมทั้งการใช้แอปแอนตี้ไวรัสชื่อดังที่มีการอัปเดตฐานข้อมูลมัลแวร์อย่างสม่ำเสมอจะช่วยลดโอกาสตกเป็นเหยื่อของมัลแวร์ประเภทนี้ได้มาก สุดท้ายนี้ เหตุการณ์ที่เกิดขึ้นยังเป็นสัญญาณเตือนให้ผู้ใช้อุปกรณ์ไอทีทุกคนต้องระมัดระวังในการเลือกใช้งานแอปความปลอดภัยต่าง ๆ ไม่ควรไว้ใจแหล่งฝากไฟล์เพียงเพราะดูน่าเชื่อถือ เช่น Hugging Face ถึงแม้ว่าจะเป็นแพลตฟอร์มเปิดที่มีชื่อเสียงในวงการ AI ก็ตาม เพราะแฮกเกอร์สามารถใช้ช่องโหว่ของระบบ CDN เพื่อกระจายมัลแวร์ได้เช่นกัน การตระหนักรู้และมีความรู้เรื่องภัยไซเบอร์จึงเป็นสิ่งสำคัญเพื่อปกป้องข้อมูลส่วนตัวจากการถูกโจรกรรมอย่างมีประสิทธิภาพ

Related posts

Really cool Google hack where you can remove your Gmail account from unwanted websites #website #websites #gmail #manageaccount #usefulhack #usefultips #data #google #googledata #gmailaccount #googleactivity #googletricks #email #apps #data #databreach #privacy #
Cybersecurity Girl

Cybersecurity Girl

6081 likes

5 Certifications I’m Getting in Cybersecurity 💻
im currently studying Cybersecurity/Digital Forensics, and these are the five certifications I’m earning to build real-world skills and long-term stability 💻✨ this field is about consistency, discipline, and strategy. every cert has a purpose, and every step compounds. soft life, but secure.
shay 💕

shay 💕

74 likes

Free Cybersecurity Courses from IBM
If you are interested in Cybersecurity, these FREE courses from IBM make learning easy and accessible for everyone 1. Introduction to Hardware and Operating Systems. In this course you are going to learn about: * Demonstrate an understanding of operating system fundamentals. * Recognize deskto
Ivy League Help

Ivy League Help

1248 likes

A young woman with long dark hair, wearing a pink satin shirt, smiles at the camera while sitting at a table. Overlay text reads: 'Tools and sites I use as a cybersecurity student to progress my skills and keep me interested in studying'.
A screenshot of 'The Hacker News' website, displaying various cybersecurity news articles from January 2025, including topics like vulnerabilities, malware, cyber espionage, and AI jailbreak methods. An ad for Zscaler and a banner for CIS Hardened Images are also visible.
A screenshot of the O'Reilly learning platform, showing various books and expert playlists related to AI, engineering, and data. Overlay text highlights the subscription cost ($50/month or $499/year) and its value for accessing books and live events.
Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

103 likes

Free Cybersecurity Courses from Microsoft
If you are interested in Cybersecurity, these FREE courses from Microsoft make learning easy and accessible for everyone 1. Cybersecurity Threat Vectors and Mitigation. In this course you are going to learn about: * Gain a comprehensive understanding of the constantly evolving world of cyber thr
Ivy League Help

Ivy League Help

245 likes

2025 Cybersecurity Roadmap
If you want to break into Cybersecurity in 2025 these are the exact steps you need to follow. #cybersecurity #tech #cybersecuritymentor #cybersecuritytips
Quanahmichelle

Quanahmichelle

287 likes

Developing a career in cybersecurity
Hey All! 👋 Want to stay safe online and protect your data? Cybersecurity knowledge is essential. It helps you secure your personal information and understand how to safeguard your digital footprint. Let’s dive into why it’s crucial! 💻🔒 Why Cybersecurity Matters Cybersecurity is about protecting
Meghana

Meghana

549 likes

Top 3 Cybersecurity Certifications For Your Career
Want to break into the high-demand field of cybersecurity or advance your existing career? Here are the top 3 cybersecurity certifications that can open doors to exciting job opportunities and higher salaries! 🌟 🛡️ Certified Information Systems Security Professional (CISSP) Why It's Va
Pradeep M

Pradeep M

250 likes

Cybersecurity careers, I wish I knew sooner..
Discover the Cybersecurity Careers You Need to Know About 🔒 As someone who's been in the field, I'm sharing insights on two in-demand roles: 📊 Cybersecurity Analyst - Focuses on monitoring, detecting, and responding to security incidents - Requires strong analytical thinking and pro
Dominica Amauri

Dominica Amauri

70 likes

Day 19: 31 Days to a safer you If you use Google Chrome you need to watch this! #googlechrome #cybersecurity #google #privacy
Cybersecurity Girl

Cybersecurity Girl

2433 likes

Break into Cybersecurity with this powerful Tool
Use this tool to create a stellar portfolio the cybersecurity hiring managers will love #cybersecuritytips #cybersecurity #cybersecuritystudent #tech #technology
JamesCybersecurity

JamesCybersecurity

24 likes

A smiling woman sits on a green couch with a laptop, with text overlay "How to Become: a cybersecurity analyst," introducing a guide to this career path. The image also includes the Lemon8 logo and username.
A smiling woman sits on a green couch with a laptop, overlaid with text listing "Essential Security Tools" like Wireshark, Metasploit, Nmap, and Splunk for cybersecurity. The Lemon8 logo is also visible.
A smiling woman sits on a green couch with a laptop, overlaid with text detailing "Key Technical Skills" for cybersecurity, including scripting languages (Python, Bash), network protocols, and encryption. The Lemon8 logo is present.
Cybersecurity Analyst Blueprint 🔐💼🚀
Here’s your game plan to become a cybersecurity analyst! 🗺️ 1. Build Your Base: Get solid with IT, networking, and basics like coding. Certifications like CompTIA Security+ or CEH will give your resume a boost. 📚 2. Get Hands-On: Create a home lab, join CTF challenges, or dive into open-source
Dominica Amauri

Dominica Amauri

121 likes

A laptop screen displays 'CYBERSECURITY CERTIFICATIONS' with security icons, indicating a guide to career-boosting certifications. A hand is visible, and 'SWIPE' suggests more information on the topic.
This image details two key cybersecurity certifications: CompTIA Security+, an entry-level certification, and Certified Information Systems Security Professional (CISSP), a globally recognized expert certification, presented over a blurred laptop background.
This image outlines three advanced cybersecurity certifications: Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), and Certified Cloud Security Professional (CCSP), displayed against a blurred laptop keyboard.
5 cybersecurity certifications for career boost
Hello everyone! Cybersecurity certifications offer professionals significant benefits by validating specialized skills and knowledge in areas like ethical hacking, network security, and cloud security. They enhance credibility, increase job prospects, and potentially boost earning potential. These
Yun Jung

Yun Jung

383 likes

8 Free Online Certifications to Boost Your Resume
Hi, lemons! In today's competitive job market, having the right certifications can make a significant difference in showcasing your skills and expertise. Online certifications are not only convenient but also cost-effective. Here are six free online certifications that can give your resume a va
Lifestyle Babe

Lifestyle Babe

1214 likes

3 cybersecurity jobs that pay well
1. Security Analyst - What They Do: Monitor networks for vulnerabilities, investigate breaches, and implement security measures. - How to Start: - Obtain certifications like CompTIA Security+ or CySA+. - Gain experience with tools like SIEM (e.g., Splunk). - Start in an I
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

630 likes

Cybersecurity Roadmap
Link in the bio for resources #cybersecuritymentor #cybersecuritycertifications #cybersecurityroles #cybersecuritycourse #cybersecurity
Quanahmichelle

Quanahmichelle

23 likes

A list titled "BEST YOUTUBE CHANNELS TO LEARN..." featuring various tech topics like Cybersecurity, Python, React, JavaScript, Java, DevOps, Blockchain, AI/ML, Web Development, AWS, Swift, SQL, DBMS, Ruby, Scala, SAP, C, R, jQuery, C#, .NET, Kotlin, Flutter, Laravel, and PHP, each paired with a recommended YouTube channel. The image includes a YouTube logo and the handle @securitytrybe.
Top YouTube Channels for Tech Mastery 🔑ℹ️⬇️
Unlock Your Tech Potential: The Best YouTube Channels for Learning Ever felt like the world of tech is just out of reach? Whether you’re diving into cybersecurity or mastering the nuances of UI/UX design, these YouTube channels will guide you every step of the way. Let’s break down the best reso
RoadToRiches

RoadToRiches

84 likes

Top Cybersecurity Certificates
There are several reputable cybersecurity certifications that can help you advance your skills and knowledge in the field of cybersecurity. 1. Certified Information Systems Security Professional (CISSP): - CISSP is a globally recognized certification that covers a wide range of cybersecurit
anjali.gama

anjali.gama

110 likes

CYBERSECURITY SKILLS FOR YOUR RESUME
Until you have landed your first role, it’s crucial to gain hands on experience whether it’s from labs, projects, internships ect. Anything you can do to prove you can do the tasks required in the position will help you. Gotta do what ya gotta do #cybersecurity #cybersecuritytips #techresume
JayyDizzy | Cyber

JayyDizzy | Cyber

33 likes

Cybersecurity projects for your resume
#cybersecurity #resumetips #techjobs #tech
JamesCybersecurity

JamesCybersecurity

16 likes

iPhone settings I would turn on as a cybersecurity and data privacy expert. #iphonetips #iphone #techtips
Cybersecurity Girl

Cybersecurity Girl

596 likes

A person with long dark hair and a straw hat walks through a sunny public square. Overlay text reads "CYBERSECURITY CAREER Tips to get started," introducing advice for a career in cybersecurity.
A person in a white dress walks on a path next to green bushes. Overlay text advises to "Build a Strong Technical Foundation" by learning networking basics, operating systems, and scripting languages.
People walk across a street with benches and trees in the background. Overlay text suggests to "Get Hands-On Experience" through CTF competitions, cybersecurity challenges, and setting up a home lab.
Tips for pursuing a career in cybersecurity
1. Build a Strong Technical Foundation A solid understanding of systems, networks, and programming is essential for identifying and mitigating security threats. • Learn networking basics (e.g., TCP/IP, firewalls, VPNs). • Gain familiarity with operating systems (Windows, Linux)
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

129 likes

Operating system notes + CompTIA A+
Some definitions used in my operating systems course along with useful information for your comptia exam. The comptia objectives can be found at the bottom of the first slide but things may have changed by now. Slides 2 & 3 are common ports and connectors, do your best to memorize these as they
Munbun

Munbun

80 likes

A woman works on a laptop at a white desk, with text overlay "Cybersecurity careers No coding required," introducing non-technical roles in the field.
A woman lies upside down on a couch, with text overlay "Governance, Risk, and Compliance (GRC)," highlighting a cybersecurity career path.
A woman sits at a desk with a laptop, being photographed by a man, with text overlay "Security Policy Development," illustrating a cybersecurity role.
Cybersecurity jobs for the non-tech girlies 👩🏽‍💻
Here are 3 career paths that I wish I knew about when I was trying to break into tech that focus on strategy, analysis, and human factors: 1. Governance, Risk, and Compliance (GRC): Shape organizational security policies and ensure regulatory compliance. Your analytical skills can help businesse
Dominica Amauri

Dominica Amauri

390 likes

How to delete all your data online pt 27
Cybersecurity Girl

Cybersecurity Girl

1496 likes

6 cybersecurity career paths to explore
Hello everyone! Cybersecurity offers varied career paths with specialized roles crucial for protecting digital assets. These roles are essential in cybersecurity, ensuring organizations are resilient against evolving digital threats.They involve proactive identification of vulnerabilities, swift in
Yun Jung

Yun Jung

102 likes

An image highlighting various certifications like Agile Project Management, CompTIA A+, CISM, and Project Management Professional, with an overlay text stating "Top Cybersecurity Certifications to Get Hired in 2025."
The image lists and displays logos for key cybersecurity certifications: CompTIA Security+, Certified Information Systems Security Professional (CISSP), and Certified Ethical Hacker (CEH).
A mind map visually organizes complex concepts related to CFA Level 3, including portfolio management, fixed income, alternative investments, economics, and quantitative methods.
Top Cybersecurity Certifications to Get Hired in
Top Cybersecurity Certifications to Get Hired in 2025 Cybersecurity is one of the fastest-growing fields — companies everywhere are hiring professionals to protect their data. The right certification can skyrocket your chances of landing a high-paying role. Here are the most valuable cybersec
devswitchwithai

devswitchwithai

173 likes

A person sits in a chair using a laptop in a modern common area. The image introduces the topic with text: 'Building a career in Cybersecurity' and 'SWIPE'.
A person sits in a chair using a laptop. Text overlays instruct to 'Review criteria for Entry-level cybersecurity roles' and 'Review relevant Certifications' for career development.
A person stands at a high table using a laptop in an office setting. Text advises to 'stay updated with the rapidly evolving tech world' for cybersecurity careers.
How to break into cybersecurity
A great career that has been in high demand is cyber security. Especially with the rise of data privacy and data protection, cyber security careers have risen. If you are interested in pursuing this career, here are three steps to get started: Review Entry-level cybersecurity roles and what they e
Serena | Data

Serena | Data

7 likes

Specialized Roles in Tech: Cybersecurity & UX
Hello everyone! I wanted to share insights into two specialized tech roles: UX Design and cybersecurity. UX Design enhances user satisfaction by creating intuitive interfaces through research, prototyping, and testing. Meanwhile, cybersecurity professionals protect digital assets with security meas
Yun Jung

Yun Jung

33 likes

Instagram is sharing your exact location to all your followers Turn this off ASAP. #techtips #instagram #news #technews
Cybersecurity Girl

Cybersecurity Girl

201 likes

Tech and Cybersecurity Truths
#cybersecurity #cybersecurityjobs #technology #tech #techgirlie
Quanahmichelle

Quanahmichelle

42 likes

Cybersecurity checklist for corporate girlies
Hey All! 🌍 Staying safe online is more important than ever. Here are some key cybersecurity practices and tools to help protect your digital life. Let’s dive in! 👇 1. Strong Passwords 🔑 Use a Password Manager: Tools like LastPass or 1Password help create and store complex passwords. Unique Pas
Meghana

Meghana

18 likes

Cybersecurity Study Session | Encryption Edition
Happy Sunday!! On this Cybersecurity self-learning path, and let me just say my brain is being fed! Today’s focus: 👩🏾‍💻Reviewed the basics of encryption 👩🏾‍💻Learned the difference between symmetric and asymmetric encryption 👩🏾‍💻Took notes on key terms like AES, RSA, public key, private key
Bee 👩🏾‍💻 | WFH & Keebs

Bee 👩🏾‍💻 | WFH & Keebs

19 likes

Certified and Ready for My Cybersecurity Degree!
On My Way to Becoming a Cybersecurity Pro! 🎓🔐 Just Earned My Info Assurance & Security Cert, Now Tackling My BSc in Cyber Security! #UniversityOfPhoenix #TechJourney #RobinHood
BinaryRecovery

BinaryRecovery

15 likes

Day 4 of 31; 31 days to a safer you. How you can delete all your data online “Incogni” 👇🏼 Follow for more #IncogniPartner
Cybersecurity Girl

Cybersecurity Girl

845 likes

CyberSecurity Major @ 35
35 and building a new future in cybersecurity. Proud of every step. 🌸 Stepping into the Tech World requires a lot of discipline and accountability!! As someone who finds it very difficult to focus, and who tends to procrastinate on long and tedious task….this is definitely a challenge. #Wome
TrapNSlayy

TrapNSlayy

17 likes

stay safe online with this app!
staying safe online has never been more important, especially with all the time we spend on our devices. that's why i’ve started using a vpn, and tunnelbear is my go-to app on the ipad for keeping my online activity private and secure. 🐻🌍 a vpn (virtual private network) is essential for protect
asmae🐸

asmae🐸

39 likes

Follow for all the online safety tips #safetytips #onlinesafety #onlinesafetyforkids Stich @lorigreinershark
Cybersecurity Girl

Cybersecurity Girl

373 likes

A list titled 'Top Cybersecurity GitHub Projects' created by Dan Nanni, updated 2026/1. It displays 25 GitHub projects with their star counts, repository names, and brief descriptions, covering tools for hacking, pentesting, reverse engineering, proxies, and security scanning.
Top cybersecurity-related GitHub projects
My top GitHub list for cybersecurity projects is updated for this month 😎👆 Explore top-ranked FOSS projects spanning both the defensive and offensive sides of cybersecurity. Find a high-res pdf book with all my cybersecurity related infographics from https://study-notes.org #cybersecurity
Dan Nanni

Dan Nanni

28 likes

Incognito Mode isn’t what you think! 😶 Hi, I’m Caitlin, a Cybersecurity Expert, and if you want to learn more about staying safe online and protecting your data, make sure to follow! #Cybersecuritytip #Cyberprotection #Techtips #Internetsafety #datasharing
Cybersecurity Girl

Cybersecurity Girl

454 likes

#cybersecurity #studying #studytok #studywithme #BackToSchool
study with me 📚

study with me 📚

22 likes

#CapCut Clearing your Google browsing history doesn’t actually erase your data! Learn how to fully delete your search activity from Google servers. Stay safe online! 🛡️💻 #GoogleTips #OnlinePrivacy #CyberSecurity #ProtectYourData #DataPrivacy #StaySafeOnline #TechTips #CyberAware
Cybersecurity Girl

Cybersecurity Girl

58 likes

A screenshot of the Erase Me app interface, highlighting a pop-up that asks "How to see if your information is on the Dark Web!!" and mentions deleting personal information exposed online.
A screenshot of the Erase Me app interface, showing a pink box with "Click these three lines" pointing to a hamburger menu icon, and the text "ERASE YOUR DATA FROM THE INTERNET."
A menu from the Erase Me app with options like Home, How Does It Work, Pricing, FAQ, Sign In, and an "Exposure Report" button, with a pink arrow pointing to "Click here!".
DON’T MISS THIS APP. (from a private investigator)
⚠️No subscription required⚠️ This app is one of the ONLY apps I have a subscription to. It is worth it 100% you can run a free search on your information and see where all it is located at on the web but when I say be prepared for what you see, BE PREPARED. I can almost guarantee your information
Kristin🔆🔍

Kristin🔆🔍

741 likes

Apple’s iOS 26 introduces important security and privacy enhancements that users need to install immediately. Features like automatic screening of unknown calls and messages, improved anti-tracking in Safari, and enhanced on-device data protection elevate iPhone security to a new level. Keeping you
Cybersecurity Girl

Cybersecurity Girl

82 likes

Cybersecurity Goal ✅
Set a goal to break into cybersecurity this year. Did it. 🖥️🔐 Living on the non technical side of tech as a GRC Analyst | Cybersecurity Auditor | Compliance Analyst. I LOVE IT HERE!❤️
Msfebruary18th

Msfebruary18th

10 likes

Posting this again because everyone deserves to know . Instagram maps is sharing your exact location to all your followers. They say it’s turned off by default but many say theirs was on #instagram #news #technews #instagrammap
Cybersecurity Girl

Cybersecurity Girl

24 likes

See more