Blog

New Trojan Wave Targets Crypto Wallets and Banking Apps: 4 Malware Families Exposed

Published May 4th, 2026 by Bayonseo

Hundreds of millions of users' financial livelihoods are the direct target of a new wave of sophisticated Android spyware. Four active malware families are currently targeting over 800 applications, including popular cryptocurrency wallets and banking apps from around the world, according to new research by Zimperium's zLabs team.

These trojans, which go by the names RecruitRat, SaferRat, Astrinox, and Massiv, do not employ straightforward, detectable techniques. Malware has developed to completely evade the majority of conventional signature-based security measures. These families are extremely elusive, using sophisticated strategies like payload encryption, environment-aware execution, dynamic code loading, and APK alteration to evade detection by antivirus programs.


How the Attack Works: Overlay Attacks and Remote Control

The trojans' most harmful feature, HTML overlay attacks, is activated once they are installed on an Android smartphone. These trojans keep an eye on the device in real time by using Android's Accessibility Services. They instantly show a phony login screen that precisely resembles the actual one when they see a user opening a targeted banking or cryptocurrency app, collecting all of the victim's credentials.

  • But the harm goes much beyond password theft. Additionally, the malware can:
  • Steal 2FA Codes: Getting around security measures by intercepting SMS-based one-time passwords.
  • Record Complete Audio and Video: The malware has the ability to broadcast to the attacker anything that occurs on a device's screen.
  • Avoid Removal: Trojans have the ability to conceal their own program icons, making it difficult for users to remove them.


How to Stay Safe from This Malware Threat

Being cautious is your first line of defense because these dangers frequently infiltrate devices through social engineering, posing as "free" streaming services, phony job applications, or even phony government apps.

  • Watch Out for Download Sources: Limit the "Install from unknown sources" option. Download apps only from the official Google Play Store.
  • Examine App Permissions: If an app requests accessibility permissions, proceed with extreme caution. These are a distinguishing feature of banking trojans.
  • Turn on Google Play Protect, an integrated security tool that provides a baseline scan for potentially dangerous apps.


How Bayon Technologies Group Can Help

Beyond signature-based detection, we at Bayon Technologies Group offer complete mobile threat defense solutions. We support organizations:

  • Behavior analysis can be used to identify Zero-Day Threats and detect malware even when it employs obfuscation.
  • Enforce strict permissions to prevent corporate devices from being misused for accessibility services.
  • Prevent sideloaded malware by managing your devices with required patch updates and application whitelisting.

Prevent these sophisticated, elusive trojans from obtaining your bank information. To arrange a free mobile security audit, get in touch with Bayon Technologies Group right now.


‹ Back