Cybersecurity researchers have disclosed a brand new Android malware household referred to as Perseus that is being actively distributed within the wild with an goal to conduct system takeover (DTO) and monetary fraud.
Perseus is constructed upon the foundations of Cerberus and Phoenix, on the identical time evolving right into a “extra versatile and succesful platform” for compromising Android gadgets by dropper apps distributed by way of phishing websites.
“By way of Accessibility-based distant periods, the malware permits real-time monitoring and exact interplay with contaminated gadgets, permitting full system takeover and focusing on numerous areas, with a robust give attention to Turkey and Italy,” ThreatFabric stated in a report shared with The Hacker Information.
“Past conventional credential theft, Perseus displays person notes, indicating a give attention to extracting high-value private or monetary info.”
Cerberus was first documented by the Dutch cell safety firm in August 2019, highlighting the malware’s abuse of Android’s accessibility service to grant itself further permissions, in addition to steal delicate information and credentials by serving pretend overlay screens. Following the leak of its supply code in 2020, a number of variants have emerged, together with Alien, ERMAC, and Phoenix.
Among the artifacts distributed by Perseus are listed beneath –
- Roja App Directa (com.xcvuc.ocnsxn) – Dropper
- TvTApp (com.tvtapps.reside) – Perseus payload
- PolBox Television (com.streamview.gamers) – Perseus payload
ThreatFabric’s evaluation has uncovered that the malware expands on the Phoenix codebase, with the risk actors doubtless counting on a big language mannequin (LLM) to help with the event. That is primarily based on indicators similar to intensive in-app logging and the presence of emojis within the supply code.
As with the just lately disclosed Massiv Android malware, Perseus masquerades as IPTV companies to focus on customers who wish to sideload such apps on their gadgets to observe premium content material. Campaigns distributing the malware have primarily focused Turkey, Italy, Poland, Germany, France, the U.A.E., and Portugal.
“By embedding its payload inside this anticipated context, the Perseus malware successfully reduces person suspicion and will increase an infection success charges, mixing malicious exercise with a generally accepted distribution mannequin for such companies,” ThreatFabric stated.
As soon as deployed, Perseus capabilities no in a different way from different Android banking malware in that it launches overlay assaults and captures keystrokes to intercept person enter in real-time and show pretend interfaces atop monetary apps and cryptocurrency companies to steal credentials.
The malware additionally permits the operator to remotely concern instructions by way of a command-and-control (C2) panel, and carry out and authorize fraudulent transactions. Among the supported instructions are as follows –
- scan_notes, to seize contents from numerous note-taking apps, similar to Google Maintain, Xiaomi Notes, Samsung Notes, ColorNote Notepad Notes, Evernote, Easy Notes Professional, Easy Notes, and Microsoft OneNote (specifies the fallacious bundle identify “com.microsoft.onenote” as an alternative of “com.microsoft.workplace.onenote”).
- start_vnc, to launch a near-real-time visible stream of the sufferer’s display screen.
- stop_vnc, to cease the distant session.
- start_hvnc, to transmit a structured illustration of the UI hierarchy and permit the risk actor to work together with UI parts programmatically.
- stop_hvnc, to cease the distant session.
- enable_accessibility_screenshot, to allow taking screenshots utilizing the accessibility service.
- disable_accessibility_screenshot, to disable taking screenshots utilizing the accessibility service.
- unblock_app, to take away an utility from the blocklist.
- clear_blocked, to clear all the record of blocked purposes.
- action_blackscreen, to show a black display screen overlay to cover system exercise from the person.
- nighty, to mute audio.
- click_coord, to carry out a faucet at particular display screen coordinates.
- install_from_unknown, to pressure set up from unknown sources.
- start_app, to launch a specified utility.
Perseus performs a variety of atmosphere checks to detect the presence of debuggers and evaluation instruments like Frida and Xposed, in addition to confirm if a SIM card has been inserted, decide the variety of put in apps and if it is unusually low, and validate battery values to verify it is working in an precise system.
The malware then combines all this info to formulate an total suspicion rating that is despatched to the C2 panel to determine the following plan of action and if the operator ought to proceed with information theft.
“Perseus highlights the continued evolution of Android malware, demonstrating how fashionable threats construct upon established households like Cerberus and Phoenix whereas introducing focused enhancements quite than fully new paradigms,” ThreatFabric stated.
“Its capabilities, which vary from Accessibility-based distant management and overlay assaults to notice monitoring, present a transparent give attention to maximizing each interplay with the system and the worth of the information collected. This steadiness between inherited performance and selective innovation displays a broader development towards effectivity and adaptableness in malware improvement.”

