Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#android-malware

Illustration of a smartphone with network lines and blockchain symbols emanating from it, signifying its use as a network pivot.
Ransomware & Malware

TrickMo Uses TON for Android Network Pivots

Android banking trojans just got more devious. TrickMo's latest iteration weaponizes your phone into a network pivot using TON and SOCKS5.

5 min read 1 week, 4 days ago
Conceptual image representing a hidden network connection within a blockchain structure.
Ransomware & Malware

TrickMo Banker Hides on TON Blockchain: A New C2 Game

Android banker TrickMo has adopted The Open Network (TON) blockchain for covert command-and-control, making it harder to detect and block. This isn't just an update; it's an architectural shift in how malware operates.

5 min read 1 week, 5 days ago
Graphic representing a smartphone displaying game icons, with a subtle, ominous overlay suggesting hidden malware.
Nation-State Threats

North Korea's BirdCall Malware Hits Android Via Games

Who knew your favorite mobile game could be a gateway to North Korean surveillance? ScarCruft's latest play uses a compromised game platform to deliver an Android variant of their notorious BirdCall malware.

5 min read 2 weeks, 4 days ago
Screenshot of a Telegram Mini App displaying a fake cryptocurrency investment dashboard.
Ransomware & Malware

Telegram Scams Exploit Mini Apps

Think Telegram's neat little Mini Apps are all fun and games? Think again. Scammers are turning them into Trojan horses.

4 min read 2 weeks, 6 days ago
🤖
Explainers

[First] PromptSpy: Android Malware Hijacks Gemini AI

Imagine malware that's not just smart—it's *conversing* with AI to outsmart your phone's swipes. PromptSpy does exactly that, marking the dawn of generative AI in Android threats.

4 min read 1 month, 1 week ago

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details