By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans
Computing

Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans

News Room
Last updated: 2025/09/01 at 2:43 PM
News Room Published 1 September 2025
Share
SHARE

Sep 01, 2025Ravie LakshmananMobile Security / Malvertising

Cybersecurity researchers are calling attention to a new shift in the Android malware landscape where dropper apps, which are typically used to deliver banking trojans, to also distribute simpler malware such as SMS stealers and basic spyware.

These campaigns are propagated via dropper apps masquerading as government or banking apps in India and other parts of Asia, ThreatFabric said in a report last week.

The Dutch mobile security firm said the change is driven by recent security protections that Google has piloted in select markets like Singapore, Thailand, Brazil, and India to block sideloading of potentially suspicious apps requesting dangerous permissions like SMS messages and accessibility services, a heavily abused setting to carry out malicious actions on Android devices.

“Google Play Protect’s defences, particularly the targeted Pilot Program, are increasingly effective at stopping risky apps before they run,” the company said. “Second, actors want to future-proof their operations.”

Audit and Beyond

“By encapsulating even basic payloads inside a dropper, they gain a protective shell that can evade today’s checks while staying flexible enough to swap payloads and pivot campaigns tomorrow.”

ThreatFabric said that while Google’s strategy ups the ante by blocking a malicious app from being installed even before a user can interact with it, attackers are trying out new ways to get around the safeguards — an indication of the endless game of whack-a-mole when it comes to security.

This includes designing droppers, keeping in mind Google’s Pilot Program, so that they don’t seek high-risk permissions and serve only a harmless “update” screen that can fly past scanning in the regions.

But it’s only when the user clicks the “Update” button that the actual payload gets fetched from an external server or unpacked, which then proceeds to seek the necessary permissions to fulfil its objectives.

“Play Protect may display alerts about the risks, as a part of a different scan, but as long as the user accepts them, the app is installed, and the payload is delivered,” ThreatFabric said. “This illustrates a critical gap: Play Protect still allows risky apps through if the user clicks Install anyway, and the malware still slips through the Pilot Program.”

One such dropper is RewardDropMiner, which has been found to serve along with spyware payloads a Monero cryptocurrency miner that can be activated remotely. Recent variants of the tool, however, no longer include the miner functionality.

Some of the malicious apps delivered via RewardDropMiner, all targeting users in India, are listed below –

  • PM YOJANA 2025 (com.fluvdp.hrzmkgi)
  • °RTO Challan (com.epr.fnroyex)
  • SBI Online (com.qmwownic.eqmff)
  • Axis Card (com.tolqppj.yqmrlytfzrxa)

Other dropper variants that avoid triggering Play Protect or the Pilot Program include SecuriDropper, Zombinder, BrokewellDropper, HiddenCatDropper, and TiramisuDropper.

When reached for comment, Google told The Hacker News it has not found any apps using these techniques distributed via the Play Store and that it’s constantly adding new protections.

“Regardless of where an app comes from – even if it’s installed by a ‘dropper’ app – Google Play Protect helps to keep users safe by automatically checking it for threats,” a spokesperson said.

“Protection against these identified malware versions was already in place through Google Play Protect prior to this report. Based on our current detection, no apps containing these versions of this malware have been found on Google Play. We’re constantly enhancing our protections to help keep users safe from bad actors.”

CIS Build Kits

The development comes as Bitdefender Labs has warned of a new campaign that’s using malicious ads on Facebook to peddle a free premium version of the TradingView app for Android to ultimately deploy an improved version of the Brokewell banking trojan to monitor, control, and steal sensitive information from the victim’s device.

No less than 75 malicious ads have been run since July 22, 2025, reaching tens of thousands of users in the European Union alone. The Android attack wave is just one part of a larger malvertising operation that has abused Facebook Ads to also target Windows desktops under the guise of various financial and cryptocurrency apps.

“This campaign shows how cybercriminals are fine-tuning their tactics to keep up with user behavior,” the Romanian cybersecurity company said. “By targeting mobile users and disguising malware as trusted trading tools, attackers hope to cash in on the growing reliance on crypto apps and financial platforms.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article EU chief jet targeted by alleged Russian GPS jamming
Next Article Private cloud powers AI at New Belgium Brewing – News
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

iPhone 17 design LEAKED by case maker days before big reveal with shock makeover
News
Four Months Have Passed Since The Last AMDVLK Driver Release
Computing
Stuff’s IFA Awards 2025: our hand-picked essential gadget highlights from the huge tech expo | Stuff
Gadget
SAP will invest more than 20,000 million euros in sovereign cloud in the next decade
Mobile

You Might also Like

Computing

Four Months Have Passed Since The Last AMDVLK Driver Release

3 Min Read
Computing

Everything we expect Apple to announce at the iPhone 17 event next week

8 Min Read
Computing

Automate Customer Creation in Oracle Apps R12 with This Simple API Trick | HackerNoon

1 Min Read
Computing

Alexa+ in the real world: How I’m using Amazon’s new assistant, and where it could still improve

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?