Android OS-level manipulation enables bypass of mobile payment security controls via system API abuse
Summary
Hide ▲
Show ▼
An Android runtime manipulation technique leveraging the LSPosed framework has been disclosed, enabling attackers to intercept, spoof, or inject data at the OS level to bypass mobile payment protections such as SMS-based 2FA, SIM-binding, and app integrity checks. The attack targets legitimate payment apps without code modification, retaining valid signatures and evading Google Play Protect. Malicious modules like "Digital Lutera" hook system APIs to intercept SMS 2FA tokens, spoof device identities, and manipulate device databases in real time. By combining a compromised victim device with a manipulated attacker-controlled device, fraudsters exploit weakened SIM-binding and backend trust models to authorize unauthorized transactions and reset payment PINs without user awareness.
Timeline
-
17.03.2026 18:30 1 articles · 3h ago
Android system-level manipulation via LSPosed enables real-time bypass of mobile payment security controls
A new Android runtime manipulation technique using the LSPosed framework allows attackers to intercept, spoof, or inject data at the OS level, bypassing app integrity checks, Google Play Protect, and SMS-based 2FA. The method exploits system APIs to manipulate SMS delivery, device identity, and device databases in real time, undermining SIM-binding and backend trust models used by financial institutions. Malicious modules such as "Digital Lutera" are deployed to enable account takeovers, PIN resets, and unauthorized transactions without user awareness.
Show sources
- Android OS-Level Attack Bypasses Mobile Payment Security — www.infosecurity-magazine.com — 17.03.2026 18:30
Information Snippets
-
Attack vector uses LSPosed framework to inject malicious modules into Android runtime, enabling OS-level interception of app-to-system communications without modifying application code or APKs.
First reported: 17.03.2026 18:301 source, 1 articleShow sources
- Android OS-Level Attack Bypasses Mobile Payment Security — www.infosecurity-magazine.com — 17.03.2026 18:30
-
Malicious module "Digital Lutera" targets Android APIs to intercept SMS 2FA tokens, spoof phone numbers via system APIs, and inject fake SMS records into device databases in real time.
First reported: 17.03.2026 18:301 source, 1 articleShow sources
- Android OS-Level Attack Bypasses Mobile Payment Security — www.infosecurity-magazine.com — 17.03.2026 18:30
-
Technique undermines SIM-binding, a security control that ties bank accounts to a physical SIM and device, by manipulating SMS verification tokens and device signals.
First reported: 17.03.2026 18:301 source, 1 articleShow sources
- Android OS-Level Attack Bypasses Mobile Payment Security — www.infosecurity-magazine.com — 17.03.2026 18:30
-
Fraudsters coordinate actions via real-time command servers and exploit a victim device alongside a manipulated attacker device to trick bank servers into believing the victim’s SIM is present elsewhere.
First reported: 17.03.2026 18:301 source, 1 articleShow sources
- Android OS-Level Attack Bypasses Mobile Payment Security — www.infosecurity-magazine.com — 17.03.2026 18:30
-
Attack enables scalable account takeovers, including PIN resets and unauthorized fund transfers, without victim awareness; activity observed on Telegram channels with over 500 login-related messages.
First reported: 17.03.2026 18:301 source, 1 articleShow sources
- Android OS-Level Attack Bypasses Mobile Payment Security — www.infosecurity-magazine.com — 17.03.2026 18:30
-
Detection is difficult due to persistent system-level hooks; reinstalling apps does not remove the threat as malicious modules remain active in the OS.
First reported: 17.03.2026 18:301 source, 1 articleShow sources
- Android OS-Level Attack Bypasses Mobile Payment Security — www.infosecurity-magazine.com — 17.03.2026 18:30
-
Mitigations proposed include hardware-based integrity checks, stricter backend validation of SMS delivery, and reliance on carrier-level confirmation instead of device-reported data.
First reported: 17.03.2026 18:301 source, 1 articleShow sources
- Android OS-Level Attack Bypasses Mobile Payment Security — www.infosecurity-magazine.com — 17.03.2026 18:30