News
July 7, 2025
In recent months, a wave of sophisticated threats has targeted the Android ecosystem, affecting thousands of mobile devices around the world. Malware such as AntiDot, GodFather, and SuperCard X are exploiting technical vulnerabilities and human behavior to compromise apps, data, and digital identities. For corporate security managers (CISOs, IT Managers, etc.) as well as product executives (Product Owners and Project Managers), the stakes are very high.
According to The Hacker News, a new Android malware called AntiDot has already compromised more than 3,775 devices in 273 separate campaigns, leveraging malicious overlays, accessibility services, NFC attacks, and virtualized environments to steal sensitive data and banking credentials.
In this article we analyze:
the techniques used by the Android malware mentioned above
the implications for businesses security
what an organization can (and should) do to avoid becoming the next victim
Developed by the LARVA-398 cybercriminal group, AntiDot is sold as Malware-as-a-Service (MaaS) on underground forums. It is a modular package that offers three main features:
Screen recording by abusing accessibility services
SMS interception
Data extraction from third-party apps, especially banking and crypto applications
The malware is distributed via:
Geo-targeted phishing campaigns
Malicious advertising networks (malvertising)
Coincidental apps that masquerade as Google Play updates
Once installed, the malware asks the user to enable accessibility permissions (if you missed the webinar where we talk about this, you can catch up by clicking here). Immediately after, it dynamically downloads and installs the malicious code, in a three-stage chain:
The attacker then gains remote access to the device, can spy on activity, steal credentials, and control banking apps in real time.
Test the strength of your mobile apps with DSA Pro, Mobisec’s in-depth security testing service.
One of AntiDot’s most powerful weapons is its ability to create overlays that mimic the login screens of legitimate apps. When the user opens a banking or crypto app, the malware intercepts the event and displays a fake login, indistinguishable from the original.
The remote control module is built with MeteorJS, an open-source JavaScript framework that enables real-time communication between servers and clients. The C2 (Command & Control) interface is divided into sections and is so complex that it demonstrates that AntiDot is not an improvised malware, but a scalable platform for generating dark business.
As if that were not enough, another parallel threat is represented by the GodFather malware, recently analyzed by Zimperium. Unlike classic app-imitating Trojans, GodFather takes a radical approach: it creates a virtual sandbox inside the device, where it installs a real copy of the banking app.
In this isolated environment, the user enters credentials believing they are in the real app, while in reality they are completely observed and controlled by the malware.
GodFather also exploits:
A particularly worrying aspect is the ability to steal device unlock credentials (pattern, PIN or password), making the malware a dangerously complete tool.
If your app handles financial or personal data, you can’t rely on internal testing alone. Request an advanced pentest with DSA Pro and test every vulnerability.
Learn more
Another attack front concerns the fraudulent use of NFC technology. The SuperCard X malware, recently detected in Italy, exploits an open source tool (NFCGate) to:
intercept NFC traffic between smartphones and POS
steal credit card data
send commands to the EMV chip for fraudulent transactions
Distributed via apps disguised as useful tools, SuperCard X is a prime example of how legitimate technology can be exploited. Its spread is supported by Telegram channels and Chinese MaaS platforms.
To make matters worse, even official stores are not immune. The RapiPlata app, a fake loan app, has been downloaded over 150,000 times from Google Play and the Apple App Store. Once installed, the app:
Another group of apps, however, targeted crypto wallets by stealing seed phrases via WebView phishing.
Threats don’t just come from third-party apps, your app can also become a lever for attack. With DSA Pro you can simulate real attack scenarios and fix vulnerabilities before hackers do.
Malware such as AntiDot, GodFather and SuperCard X represent a new generation of mobile threats, capable of:
For companies, all this translates into equipping themselves with a proactive, automated and scalable approach, such as the one offered by Mobisec with the DSA Suite, and in particular with DSA Pro, which allows you to:
Every day an app isn’t thoroughly tested is a day it can become the weak link in the chain.
Take the first step: discover DSA Pro and truly protect your mobile applications.