A newly discovered Android banking Trojan is employing a sophisticated technique using hidden Virtual Network Computing (VNC) to steal user credentials and bypass security measures. This malware targets banking apps by creating a hidden VNC session that allows attackers to remotely control the infected device without the user's knowledge. The Trojan is capable of intercepting two-factor authentication codes and capturing sensitive information, making it a significant threat to mobile banking security. Security researchers have identified this Trojan as a new variant that leverages advanced evasion tactics to avoid detection by antivirus software and security systems. The malware spreads primarily through malicious apps disguised as legitimate banking or financial tools, often distributed via third-party app stores or phishing campaigns. Once installed, it requests accessibility permissions to enable its remote control features. Users are advised to only download apps from official sources, keep their devices updated, and use multi-factor authentication methods to mitigate risks. This emerging threat highlights the evolving tactics of cybercriminals targeting mobile banking platforms and underscores the importance of robust mobile security practices.
This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 01 Oct 2025 06:50:13 +0000