Android Malware Campaign Uses Hugging Face to Distribute Thousands of Malicious APK Variants

Related

CISOs and Security Leaders to Watch in Australian Media and Entertainment

Cybersecurity in media and entertainment has quietly become one...

Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys

What happened A security vulnerability in the Moltbook AI agent...

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing Data

What happened Socket researchers uncovered multiple malicious Chrome extensions that...

NationStates Confirms Data Breach and Temporarily Shuts Down Game Site

What happened NationStates confirmed a data breach after unauthorized remote...

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

What happened A cyber espionage campaign attributed to an Iran-linked...

Share

What happened

An Android malware campaign is using the Hugging Face platform to host and distribute thousands of malicious APK variants. Researchers at Bitdefender found that attackers abused the trusted AI and machine learning repository to serve multiple payloads associated with a campaign centered around a dropper app called “TrustBastion.” The attack begins with victims being lured into installing the dropper, which masquerades as a mobile security tool with scareware-style ads claiming the device is infected. Once installed, TrustBastion leads users to APKs hosted on Hugging Face that collect credentials for popular financial and payment services. The malicious APKs vary in payload but stem from the same underlying malware distribution operation hosted on datasets within the platform.

Who is affected

Android users who install the TrustBastion dropper app are affected, as execution of the app can lead to the installation of malicious APKs that harvest credentials for financial and payment services.

Why CISOs should care

This campaign highlights how threat actors can leverage trusted development and repository platforms like Hugging Face to distribute polymorphic Android malware, expanding the attack surface for credential theft and mobile compromise.

3 practical actions

  • Audit Android APK installs. Investigate sources and signatures of recently installed APKs for similarities to the campaign.
  • Monitor credential harvesting vectors. Look for anomalous credential transmissions from enterprise mobile devices.
  • Educate users on sideload risks. Ensure policies discourage sideloading apps from unverified sources.