Skip to main content
Mallory
Mallory

Mobile Banking Malware and Broader Mobile Threat Trends in 2025

mobile malwaremobile bankingbanking trojanspreinstalled backdoortrojanized appadwarecredential theftfraudulent transactionsandroidunwanted softwaresideloadingkasperskytelemetrylibandroid_runtime.so
Updated March 5, 2026 at 01:15 AM2 sources
Mobile Banking Malware and Broader Mobile Threat Trends in 2025

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Reporting on mobile threats in 2025 highlighted sustained, high-volume malicious activity against Android devices, with adware dominating detections and a large number of mobile banking Trojans observed in the wild. Kaspersky’s telemetry-based review cited 14,059,465 blocked attacks involving malware/adware/unwanted software during 2025, 62% of detections attributed to adware, and 815,000+ malicious installation packages identified, including 255,000 mobile banking Trojan packages; it also noted discovery of notable threats such as the Keenadu preinstalled backdoor, reportedly injected at the manufacturing stage by modifying libandroid_runtime.so to load into the address space of apps.

Separate analysis of the Android Massiv malware described an active mobile banking fraud campaign delivered via a trojanized IPTV app, emphasizing the risk from apps sourced outside official stores. Massiv was reported to request extensive permissions and use overlay techniques to capture credentials and manipulate banking sessions, including monitoring user interactions and enabling fraudulent transactions with limited user visibility—reinforcing that mobile banking threats remain a material subset of the broader mobile malware ecosystem described in 2025 trend reporting.

Sources

March 4, 2026 at 12:00 AM

Related Stories

Surge in Mobile Malware and Banking Trojan Threats in 2025

Threat intelligence reports from multiple security vendors highlight a significant escalation in mobile malware activity and the evolution of attack strategies targeting mobile devices in 2025. Kaspersky's Q3 2025 statistics reveal that over 47 million attacks involving malware, adware, or unwanted mobile software were prevented, with trojans being the most prevalent threat. The Zscaler Threatlabz report, corroborated by Zimperium's research, documents a 67% year-over-year increase in Android malware and a 50% rise in trojan deployments, with 18% of sampled mobile devices found to be infected. These reports emphasize the growing adoption of a mobile-first attack strategy by threat actors, exploiting the expanded enterprise attack surface as remote and hybrid workforces rely more heavily on mobile devices. A notable trend is the persistence and evolution of mobile banking malware. Zimperium's analysis details the emergence of the Android/BankBot-YNRK trojan, which masquerades as legitimate apps, abuses accessibility services, and automates fraudulent transactions, reinforcing the risk to mobile banking users. The convergence of phishing techniques—such as smishing, vishing, and quishing—under the term "Mishing" further illustrates the sophistication of mobile-targeted social engineering. Collectively, these findings underscore the urgent need for organizations to strengthen mobile security controls and user awareness as mobile devices become a primary vector for credential theft, financial fraud, and enterprise compromise.

3 months ago
Surge in Mobile Malware Activity and Targeted Threats in Q4 2025

Surge in Mobile Malware Activity and Targeted Threats in Q4 2025

A significant increase in mobile malware activity was observed in Q4 2025, with Doctor Web reporting that adware trojans such as Android.MobiDash and Android.HiddenAds remained the most prevalent threats, though their detection rates declined. Conversely, banking trojans, particularly from the Android.Banker family, saw a 65.52% rise in activity, targeting users by intercepting SMS one-time codes and mimicking legitimate banking apps. The review also highlighted the widespread use of unwanted software like CloudInject, which adds dangerous permissions and obfuscated code to apps, as well as riskware programs modified with NP Manager. Additionally, Doctor Web identified new threats such as the Android.Backdoor.Baohuo.1.origin, distributed via modified Telegram X apps to steal credentials, and the unique Trojan.ChimeraWire, which manipulates website popularity metrics. Globally, India experienced a 38% year-over-year increase in mobile malware attacks, accounting for 26% of all mobile malware traffic worldwide, according to Zscaler. Hundreds of malicious apps, many disguised as productivity tools, infiltrated trusted platforms like the Google Play Store, with over 42 million downloads. Attackers focused on high-value industries, with retail, hospitality, and manufacturing sectors being primary targets. The escalation in Android malware transactions and the strategic targeting of consumer-facing and operations-heavy environments underscore the evolving tactics of threat actors and the growing risks to mobile device users and organizations worldwide.

2 months ago

Android Banking Trojans and Financial Malware Targeting User Data and Payments

Multiple new Android malware campaigns have been identified targeting users' financial data and payment methods. Researchers uncovered advanced banking trojans such as BankBot-YNRK and DeliveryRAT, which harvest sensitive information from compromised devices and employ sophisticated evasion techniques, including emulator detection and device-specific targeting. These trojans often masquerade as legitimate apps, such as Indonesia's digital ID application, and can mute device notifications to avoid detection by victims. In addition, a next-generation Android banking trojan has been observed hiding within digital ID apps, automating the theft of cryptocurrency wallets and evading analysis environments. A separate large-scale scam involves over 760 malicious Android apps exploiting NFC and HCE technologies to steal payment card data globally. These apps facilitate unauthorized transactions by leveraging contactless payment features. The surge in Android-targeted financial malware highlights the growing risk to users' banking credentials, payment cards, and cryptocurrency assets, with attackers employing increasingly sophisticated methods to bypass security controls and evade user awareness.

4 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.