Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
JDownloader Compromised: Malicious Windows & Linux
May 16, 2026
Malicious JPEG Images Exploit PHP Memory Safety Could Trigger
May 16, 2026
Home/Threats/FvncBot Exploits Android Accessibility Services to Attack
Threats

FvncBot Exploits Android Accessibility Services to Attack

A new malicious application has emerged, targeting mobile banking customers in Poland. Identified on November 25, 2025, this threat masquerades as a legitimate security tool purportedly from mBank, a...

Marcus Rodriguez
Marcus Rodriguez
February 6, 2026 2 Min Read
5 0

A new malicious application has emerged, targeting mobile banking customers in Poland. Identified on November 25, 2025, this threat masquerades as a legitimate security tool purportedly from mBank, a major Polish financial institution.

The application serves as a gateway for a novel banking trojan that operates silently in the background.

By mimicking trusted banking software, the attackers successfully deceive users into installing the malware, which then attempts to compromise their financial accounts through sophisticated surveillance techniques.

The infection process begins when the fake app prompts the user to install an additional “Play” component, claiming it is required for system stability.

This step is a critical trick designed to bypass security restrictions found on modern Android devices. The malicious loader leverages this permission to deploy the payload, ensuring it can operate persistently on the victim’s phone.

Process enabling the accessibility service of the payload application (Source - Intel471)
Process enabling the accessibility service of the payload application (Source – Intel471)

This social engineering tactic effectively lowers the user’s guard, allowing the threat to establish a foothold before any data theft begins.

Intel 471 researchers identified this specific strain and named it FvncBot, noting that its programming code is entirely original and not derived from leaked sources of other notorious banking trojans.

This uniqueness suggests a new group of developers is responsible. FvncBot unleashes invasive features to steal money, primarily by recording keystrokes and capturing screen content.

It also utilizes hidden virtual network computing, which allows cybercriminals to perform actions on the infected device remotely, facilitating fraudulent transfers while the victim remains unaware.

Abusing Accessibility for Persistence

The most alarming aspect of FvncBot is its manipulation of Android’s accessibility services to maintain control. After installation, the malware aggressively requests these high-level privileges, guiding the victim to system settings to approve them.

If the user complies, the malware gains the ability to read text on the screen and track every tap.

Payload installation process (Source - Intel471)
Payload installation process (Source – Intel471)

With accessibility services enabled, FvncBot can harvest data from any open application, including secure banking portals. It logs these details into a storage buffer and transmits them to a remote server.

Furthermore, the malware establishes a high-speed connection using WebSockets, allowing operators to issue commands instantly.

This setup enables them to stream the victim’s screen and manipulate the device remotely to commit fraud.

To stay safe, users are strongly advised to avoid installing banking applications from unofficial websites and organic search results to prevent such dangerous infections.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

CISA Orders Removal of Active Edge Devices to Cut Risks

Next Post

Transparent Tribe Attacks India’s Startup Ecosystem in New Campaign

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us