Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
JDownloader Compromised: Malicious Windows & Linux
May 16, 2026
Malicious JPEG Images Exploit PHP Memory Safety Could Trigger
May 16, 2026
Home/Threats/Hackers Use MiningDropper to Deliver Infostealers, RATs, and
Threats

Hackers Use MiningDropper to Deliver Infostealers, RATs, and

A rapidly expanding The campaign reaches victims through phishing pages, social media links, and fraudulent websites that mimic trusted services, including transport portals, banks, telecom brands,...

David kimber
David kimber
April 20, 2026 3 Min Read
13 0

A rapidly expanding

The campaign reaches victims through phishing pages, social media links, and fraudulent websites that mimic trusted services, including transport portals, banks, telecom brands, and popular mobile applications.

That broad lure strategy gives attackers many ways to trick users into downloading malicious APK files before the hidden payload chain begins.

Cyble researchers said they observed a notable surge in MiningDropper activity and linked the malware to multiple campaigns now operating across India, Europe, Latin America, and Asia.

One cluster focused on Indian users with infostealer lures, while another delivered BTMOB RAT to wider regional targets through fake app download pages.

The impact is serious because MiningDropper is not just a single malicious app but a reusable framework that lets threat actors swap final payloads as needed.

Cyble’s telemetry found more than 1,500 samples in the wild over the past month, and many showed very low antivirus detection.

Infection mechanism

What makes the operation harder to stop is its layered design, which mixes native code, encrypted assets, dynamic DEX loading, and anti emulation checks to delay analysis.

Instead of exposing the final malware at once, each stage unlocks the next one only after earlier checks pass, reducing what static scanners can immediately see.

MiningDropper attack chain (Source - Cyble)
MiningDropper attack chain (Source – Cyble)

The chain starts with a trojanized version of the open source Android project LumoLight, where malicious actions are launched through the native library librequisitionerastomous.so.

Initializing native code execution (Source - Cyble)
Initializing native code execution (Source – Cyble)

Inside that library, strings are hidden with XOR obfuscation and decrypted only at runtime, making the code harder to inspect and easier to keep below detection thresholds.

The same native component also checks platform details, system architecture, and device model information to decide whether it is running inside an emulator or rooted environment.

If the environment looks suspicious from the attacker’s view, the malware can stop its harmful activity, which helps it avoid sandboxes and automated analysis systems.

When those checks pass, the library decrypts an asset named x7bozjy2pg4ckfhn with a hardcoded XOR key, produces the first stage DEX payload, and loads it with DexClassLoader for further execution.

That first stage then decrypts a second stage file with AES, using key material derived from the filename, a choice that hides the key logic and complicates reverse engineering.

The second stage is the part most victims would notice because it can display a fake Google Play update screen, illustrated in Figure 10 Fake Google Play Update activity, to make the infection look routine.

Behind that screen, it decrypts more files, reads configuration data, and decides whether to activate a miner path or a user defined payload path for later installation.

In the user payload branch, the malware decrypts a ZIP archive and split components, rebuilds the final package, and installs a more capable threat such as BTMOB RAT through the third stage installer.

Cyble said that final payload can steal credentials through WebView injections, log keystrokes, exfiltrate data, abuse Accessibility Services, and support real time remote control, screen monitoring, file handling, audio recording, and command execution.

For defenders, the case shows how Android threats are moving toward reusable malware frameworks that separate delivery, deception, and monetization, allowing one campaign to shift quickly between banking theft, espionage style access, and silent mining without rebuilding the whole toolset.

Users can reduce risk by installing apps only from trusted stores, avoiding links received by SMS, email, or social media, checking permissions before install, keeping Android updated, using MFA for banking apps, and reporting suspicious financial activity quickly if compromise is suspected.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwarephishingThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

New RDP Alert After April 2026 Security Update Warns of Unknown

Next Post

NSA Confirms Mythos AI Use Despite Pentagon Blacklist

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us