A New Wave of Android Banking Trojan Emerges with Advanced Features
A recent discovery by researchers at Zimperium’s zLabs has unveiled a new version of the Hook Android banking Trojan, showcasing an extensive feature set that sets a new benchmark for mobile malware.
The latest variant of the Hook Trojan now boasts support for 107 remote commands, with 38 newly introduced functionalities that go beyond traditional financial theft.
Key Features of the Upgraded Hook Android Trojan
Some of the advanced features of the upgraded Hook Android Trojan include:
-
Ransomware overlays that coerce users into making payments
-
Fake NFC scanning prompts designed to steal sensitive data
-
Lock screen bypass using deceptive PIN and pattern screens
-
Transparent overlays for capturing gestures
-
Real-time screen-streaming for full monitoring
According to Frankie Sclafani, director of cybersecurity enablement at Deepwatch, the global scale of the campaign is alarming, with a rapid increase in detection counts over just a two-week period.
Evolution of Distribution Tactics
Unlike previous campaigns that relied on phishing sites, Hook’s operators are now distributing malicious APK files through GitHub repositories. This distribution method is also being used for other malware families, including Ermac, Brokewell, and various SMS spyware strains.
J Stephen Kowski, field CTO at SlashNext, highlighted the sophistication of the phishing campaign, which personalizes fake websites with victims’ email addresses and company logos to make the scam appear legitimate.
New Ransomware Tactics and Exploits
Hook Android Trojan’s latest feature includes a ransomware overlay that displays payment demands with cryptocurrency wallet addresses controlled by attackers. Fake credit card forms resembling popular services like Google Pay are used to collect payment information.
Furthermore, the Trojan continues to exploit Android Accessibility Services for automated fraud and device control, while also hinting at future integration of RabbitMQ for more resilient command-and-control (C2) communications.
Collaborative Efforts to Combat the Threat
Zimperium has collaborated with industry partners to take down at least one GitHub repository associated with the distribution of the Hook Android Trojan. This proactive approach aims to mitigate the impact of the rapidly evolving malware.
Implications for Enterprises and Individuals
The evolution of the Hook Android Trojan highlights a concerning trend where traditional banking Trojans are adopting spyware and ransomware tactics. As Sclafani notes, the Trojan poses a significant threat to both enterprises and individuals, with the potential to install persistent malicious payloads within networks.
Stay informed about the latest Android malware threats and take proactive measures to safeguard your devices and data against evolving cyber threats.

