{"id":45532,"date":"2026-04-18T10:18:35","date_gmt":"2026-04-18T02:18:35","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/18\/new-recruitrat-saferrat-astrinox-massiv-android-malware-found-targeting-800-apps\/"},"modified":"2026-04-18T10:18:35","modified_gmt":"2026-04-18T02:18:35","slug":"new-recruitrat-saferrat-astrinox-massiv-android-malware-found-targeting-800-apps","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/18\/new-recruitrat-saferrat-astrinox-massiv-android-malware-found-targeting-800-apps\/","title":{"rendered":"New RecruitRat, SaferRat, Astrinox, Massiv Android Malware Found Targeting 800 Apps"},"content":{"rendered":"\n<p>Cybersecurity Researchers from Zimperium zLabs have shared details on four new Android malware families currently being used in four different campaigns targeting Android banking and crypto apps. These are capable of stealing private data from more than 800 apps, according to Zimperium\u2019s report shared with Hackread.com.<\/p>\n<h3><strong>Meet the Four Families<\/strong><\/h3>\n<p>The zLabs team has been busy tracking these threats, which they\u2019ve named RecruitRat, SaferRat, Astrinox, and Massiv. Each one uses a different trick to lure users into downloading the malware, with the most common methods being phishing and smishing. <\/p>\n<p>Phishing involves fake websites that look exactly like real login pages for banks or popular services. For example, the SaferRat campaign uses websites that promise free access to premium video streaming services to lure victims in.<\/p>\n<div>\n<figure><a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-side.png\"><img loading=\"lazy\" decoding=\"async\" width=\"832\" height=\"310\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-side.png\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-side.png 832w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-side-300x112.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-side-768x286.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-side-380x142.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-side-800x298.png 800w\" sizes=\"auto, (max-width: 832px) 100vw, 832px\" alt=\"New RecruitRat, SaferRat, Astrinox, Massiv Android Malware Found Targeting 800 Apps\" \/><\/a><figcaption>Fake websites used to lure users (Source: Zimperium)<\/figcaption><\/figure>\n<\/p><\/div>\n<p>In Smishing, urgent text messages are used claiming there is a problem with your account, with a link that downloads the malicious payload after clicking. RecruitRat campaign uses fake job-seeking sites and targets employment seekers, making them download an <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/analyze-mobile-threats-any-run-android-os-sandbox\/\">APK<\/a> file that looks like a job application.<\/p>\n<p>Then there is Astrinox, which mimics a business tool called HireX on the site <code>xhirecc<\/code>. While researchers found a fake <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/fake-ledger-live-app-apple-store-crypto-theft\/\">Apple App Store<\/a> page for this one, they noted that the actual malicious payloads are currently only targeting Android users. The final group, Massiv, is a mystery; though, it is so well-hidden that researchers couldn\u2019t find any clear sign of how it spreads.<\/p>\n<h3><strong>The Blindfold Trick<\/strong><\/h3>\n<p>Once these apps infect a phone, they quickly launch an Overlay attack. This involves a fake screen that pops up right when you open a real app, like your bank or a crypto wallet. If you type your password, you aren&#8217;t giving it to the bank but to the hackers.<\/p>\n<div>\n<figure><a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"711\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-4-1024x711.png\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-4-1024x711.png 1024w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-4-300x208.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-4-768x534.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-4-380x264.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-4-800x556.png 800w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-4-1160x806.png 1160w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/04\/Four-New-Android-Malware-Campaigns-Targeting-Banking-Apps-4.png 1258w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" alt=\"New RecruitRat, SaferRat, Astrinox, Massiv Android Malware Found Targeting 800 Apps\" \/><\/a><figcaption>Fake overlays (Source: Zimperium)<\/figcaption><\/figure>\n<\/p><\/div>\n<p>To prevent raising suspicion, Zimperium\u2019s <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/zimperium.com\/blog\/android-bankers-4-campaigns-in-a-row\">report<\/a> found that the malware uses a blindfold. By abusing Accessibility Service permissions, it can put a non-moving image over your screen. So, you get to see a frozen page or a fake Android Update screen, while the hackers work in the background, seeing your contacts, reading your SMS messages, and even recording your screen using the MediaProjection framework.<\/p>\n<h3><strong>Bypassing Your Security<\/strong><\/h3>\n<p>One of the most dangerous parts of these attacks is how they handle security codes. We always feel safe because of one-time passwords (OTPs) sent via text, but these programs can intercept those texts in real-time.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<p>Researchers noted that RecruitRat even has a library of over 700 fake login pages stored inside it, activating the moment you open a targeted app. These threat actors are also using Keylogging to track every single tap you make. By using a constant link through WebSockets, they stay connected to your device, waiting for the perfect moment to strike. Experts suggest avoiding clicking links in urgent texts and downloading apps only from the official platforms.<\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"New RecruitRat, SaferRat, Astrinox, Massiv Android Malware Found Targeting 800 Apps\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Researchers from Zimperium zLabs have sha [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-45532","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45532"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45532\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}