Android Banking Malware Uses Fake Automotive Sites to Steal Credentials and Lock Devices

Related

CISOs to Watch in Canadian Manufacturing

Canada’s manufacturing sector spans aerospace, automotive, food production, forestry,...

CISOs to Watch in Canadian Mining & Natural Resources

Canada’s mining and natural resources sector is a global...

CISOs to Watch in Canadian Energy & Utilities

Canada’s energy and utilities sector underpins national resilience, economic...

VoiceRun’s $5.5M Seed Round Signals Enterprise Voice AI Maturation

What happened VoiceRun, a Cambridge, Massachusetts–based startup offering a code‑first...

Pax8 Email Error Exposes MSP Partner Licensing and Customer Lists

What happened A Pax8 email error exposes MSP partner licensing...

Share

What happened

The Android Banking Malware deVixor actively targets users with ransomware capabilities. It has been identified as a growing mobile threat that combines credential theft and extortion in one platform. Since October 2025, deVixor samples have been distributed via fraudulent websites mimicking legitimate automotive brands, tricking victims into installing a malicious APK. Once installed, the malware intercepts SMS messages to harvest banking credentials from over 20 major financial institutions (including Bank Melli Iran, Bank Mellat, Binance, and Ramzinex) and injects WebView-based JavaScript to capture user input. The operation uses centralized infrastructure on Telegram and dual server systems (Firebase for commands, separate C2 for stolen data). A built-in ransomware module also locks infected devices and demands payment in TRON cryptocurrency. 

Who is affected

Mobile users targeted via deceptive sites face direct exposure to credential theft and device lockouts; banking customers of targeted financial institutions and cryptocurrency platforms are at risk of unauthorized access and financial loss due to stolen authentication data. 

Why CISOs should care

This campaign illustrates the evolution of Android malware into multi-vector criminal tools, combining credential harvesting, SMS interception, and ransomware extortion with robust infrastructure control. The threat highlights risks to mobile banking security, user trust, and the broader digital financial ecosystem. 

3 practical actions

  • Harden mobile defenses: Ensure mobile threat detection solutions are deployed and updated to identify malicious APK behavior and SMS interception techniques.
  • Educate end users: Inform users about the dangers of installing apps from outside trusted app stores and recognizing phishing sites.
  • Monitor for credential compromise: Integrate banking credential monitoring and alerting to detect unusual access patterns linked to this threat.