Home OSINT News Signals
CYBER

New 'Perseus' Android Malware Scours User Notes for Sensitive Data

đź•“ 1 min read

A sophisticated new Android malware strain, dubbed "Perseus," is actively targeting users by scanning their personal notes and memos for valuable secrets. According to research from mobile security firm ThreatFabric, the malware is designed to steal sensitive information such as passwords, cryptocurrency recovery phrases, and financial data. Perseus is distributed primarily through unofficial app stores, camouflaged as illicit IPTV (Internet Protocol Television) applications that promise access to pirated live sports and entertainment streams. This distribution method exploits users' willingness to sideload applications from outside the official Google Play Store, often ignoring security warnings in the process.

The malware grants attackers comprehensive control over infected devices. Capabilities include complete device takeover, the ability to capture screenshots, and the execution of overlay attacks—a technique where fake login screens are superimposed over legitimate banking or crypto apps to harvest credentials. ThreatFabric notes that Perseus appears to be built upon the codebase of "Phoenix," another known malware family, and its dropper component is the same one used to deliver other notorious threats like Klopatra and Medusa. Notably, this dropper can bypass the enhanced sideloading restrictions introduced in Android 13 and later versions.

The campaign is part of a disturbing trend observed over the last eight months, where threat actors increasingly leverage the lure of free or cheap IPTV services to distribute malware. In a recent parallel campaign, the "Massiv" Android banking Trojan was spread using similar tactics. Perseus is currently focusing its theft operations on users in Turkey and Italy, targeting financial institutions and cryptocurrency services in those regions. One specific app bundling the malware impersonates "Roja Directa TV," a well-known sports streaming service that has frequently been subject to copyright infringement actions.

The emergence of Perseus underscores the persistent risks associated with sideloading applications from unverified sources. While official app stores are not impervious to malware, they provide significant security screening that third-party stores often lack. For Android users, the best defense is to install apps exclusively from the Google Play Store, ensure Google Play Protect is enabled, and remain highly skeptical of apps offering paid content for free. Organizations should educate employees about these risks, especially as mobile devices become increasingly integrated into corporate workflows and handle sensitive business data.

Telegram X LinkedIn
Back to News