Malware News This Android Antivirus Infects Your Device Instead of Protecting It

lokamoka820

Level 41
Thread author
Verified
Top Poster
Well-known
Mar 1, 2024
3,087
3
9,964
3,969
Banana Republic
After users install and open the app, it immediately detects a virus. In users’ defense, I’ve installed real Android antivirus apps before that did detect viruses immediately. So, I completely understand and still trusting the app.

The only problem is this particular app gives you an urgent pop-up that says you must install an update to remove the infection. Sorry, but you never had an infection. The moment you tap update, malware’s installed. Even worse, it targets financial information.

The malware takes screenshots as you interact with your device, records your device’s PIN, and even shows fake financial screens when you try to log in to financial sites. This lets the malware capture usernames and passwords.
 
What you quoted describes a very common Android scam pattern: a “security/antivirus” app that immediately claims you’re infected, then pressures you into installing an “update” that is actually the malware payload (often banking/financial malware).

Why this is a red flag
  • Instant “you have a virus” alerts right after install are frequently used to build trust, then push you into the next step.
  • The “urgent update required to clean” prompt is a classic social-engineering step to get you to install an APK/module or enable dangerous permissions.
  • Banking-focused behaviors like screen capture, overlaying fake login pages, and PIN harvesting are typical of financial malware families (often abusing Accessibility/overlay permissions).

If someone installed it (safe next steps)
  • Put the phone in Airplane mode (or disable Wi‑Fi/mobile data) to reduce further data leakage.
  • Uninstall the suspicious app. If it won’t uninstall:
    • Disable any Device Admin / Device Policy app permission it has, then uninstall.
    • Check Accessibility Services and turn off anything suspicious (many banking trojans rely on Accessibility).
  • Run a scan with a reputable mobile security product and also ensure Google Play Protect is enabled.
  • If there are strong signs of compromise (unknown Accessibility service, persistent overlays, can’t remove the app, strange “admin” apps), back up essential files and perform a factory reset, then restore carefully (avoid restoring unknown apps).
  • From a clean device, change passwords for email first (email accounts are the “keys” to resets), then banking/financial, then everything else.
  • Contact your bank(s) to monitor/secure accounts, review recent transactions, and consider replacing cards if needed.
  • Enable strong 2FA where possible (prefer app-based/passkeys over SMS if available) and review account recovery options.

Prevention / hardening
  • Avoid “antivirus/cleaner” apps with aggressive scare pop-ups; stick to well-known vendors and official stores.
  • Do not sideload “updates” from pop-ups; update only via the Play Store (or the vendor’s verified channel).
  • Be cautious granting Accessibility, “Display over other apps,” Notification access, or Device Admin rights—these are frequently abused.
  • Keep Android and apps updated; install from trusted sources only.

If this quote is from a specific article or you have the app name/package name (or a VirusTotal link), post it and the community can help validate indicators without guessing.
 
Three keys to avoid falling into the digital trap: A) The double lock: password plus code or fingerprint, because a thief with only one key can’t open the door.B) The clean phone: a bastion reserved solely for your banking gold.C) Checking permissions like inspecting fortress walls, closing doors that should never be open.

With these defenses, your mobile banking stops being a fragile hut and becomes a small stronghold. 🔑📱🛡️
 
Similar to the malicious notifications by Windows browser provoked by certain malicious extensions or visiting specific websites, to trick the user to click something like "clear infection" and download a malicious file.
 

This is BitDefender's original report on the malware, which indicates that the first-stage APK was hosted on the trustbastion[.]com website and downloaded the second stage (posted as a necessary update) from the Hugging Face CDN. The second stage was polymorphically changed every 15 minutes and requested intrusive permissions, including accessibility, which even BitDefender/ESET doesn't request.

Now my commerce apps refuse to live with any accessibility apps, even Google's 🥲.