Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Home/Threats/Android Banking Malware Hijacks Accounts via Fake KYC
Threats

Android Banking Malware Hijacks Accounts via Fake KYC

A new Android banking malware, designated KYCShadow, is actively targeting Indian bank customers by exploiting a meticulously crafted fake Know Your Customer (KYC) verification workflow. Details of...

Marcus Rodriguez
Marcus Rodriguez
April 28, 2026 3 Min Read
0 0

A new Android banking malware, designated KYCShadow, is actively targeting Indian bank customers by exploiting a meticulously crafted fake Know Your Customer (KYC) verification workflow. Details of this threat were recently published in a

The application presents itself as a trusted banking KYC service, exploiting a routine process that millions of Indian bank users are already familiar with.

Once installed, it guides users through convincing verification screens that collect mobile numbers, ATM PINs, Aadhaar numbers, and card details one step at a time.

After users complete the flow, a fake confirmation message claims that “verification is in progress,” while all submitted data is already being transmitted to a remote attacker-controlled server at jsonapi[.]biz.

Cyfirma researchers identified this campaign in April 2026 and noted that KYCShadow is engineered as a two-stage dropper.

The first application victims install acts as a loader that silently decrypts and deploys a secondary malicious payload in the background, keeping the most capable components hidden during the initial phase to avoid early detection.

Once the secondary payload is active, it requests permissions covering SMS access, phone call control, and battery optimization exemption.

These allow the malware to intercept OTPs in real time, send and forward SMS messages remotely, place phone calls without user input, and continue operating in the background even while the device is idle.

The payload also hides itself from the device app launcher, leaving no visible trace on the infected phone.

Adding to the risk, the malware activates a full-tunnel VPN service that routes all device traffic through an attacker-controlled layer.

This gives the threat actor the ability to monitor, filter, or block outbound connections to security services, reducing the device’s capacity to detect or report the infection.

Multi-Stage Infection Mechanism

The infection starts the moment the dropper application is launched, showing a deceptive “Update Required” screen with a single button labeled “Install Update,” crafted to resemble a standard system prompt that most users would tap without question.

Malware Attack Chain (Source - Cyfirma)
Malware Attack Chain (Source – Cyfirma)

Clicking the button triggers a VPN connection request, followed by a prompt to allow installation of apps from unknown sources.

Once both approvals are given, the dropper begins decrypting an embedded payload using an XOR-based algorithm tied specifically to its own package name.

APK Manifest Profiling (Source - Cyfirma)
APK Manifest Profiling (Source – Cyfirma)

This means the payload cannot be extracted or analyzed without knowing both the exact package name and the decryption logic, making the process considerably harder for security researchers.

The decrypted file is written to temporary internal storage and installed silently through Android’s PackageInstaller API with no additional user interaction.

The secondary payload, identified as com.am5maw3.android, launches in the background and immediately suppresses its own launcher icon to remain hidden.

It registers with Firebase Cloud Messaging, establishing a persistent push-based remote command channel for the attacker.

WebView phishing screen prompting users to enter their Aadhaar number and date of birth (Source - Cyfirma)
WebView phishing screen prompting users to enter their Aadhaar number and date of birth (Source – Cyfirma)

Supported commands include real-time SMS interception, bulk inbox extraction, remote call placement, and USSD-based call forwarding, all executed without producing any visible signs on the infected device.

Users should not install applications received via WhatsApp, SMS, or messaging channels, especially those claiming to offer banking or KYC updates.

Always download banking apps from official sources, keep the “Install Unknown Apps” permission disabled, and never enter credentials or card details into unverified interfaces.

Any unexpected VPN prompts, unfamiliar permission requests, or unusual SMS activity should be reported to the concerned bank without delay.

Financial institutions and security teams should immediately block traffic to jsonapi[.]biz, jsonserv[.]biz, and jsonserv[.]xyz at the network level.

Deploying mobile threat defense solutions that detect staged dropper behavior, unauthorized permission usage, and hidden app payloads will help organizations respond more quickly to campaigns of this nature.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwarephishingSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Fake Google Play Document Reader Installs Anatsa Malware

Next Post

OilRig Hides C2 Config in Google Drive Image via Configuration Using

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us