CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Perseus Android Banking Malware Leveraging Accessibility Services for Real-Time Device Takeover and Note Monitoring

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A new Android malware family named Perseus is actively distributed in the wild, enabling device takeover (DTO) and financial fraud. Built on the foundations of Cerberus and Phoenix, Perseus leverages Accessibility-based remote sessions to monitor and interact with infected devices in real time, with a strong regional focus on Turkey and Italy. The malware monitors note-taking applications to extract high-value personal or financial information, expanding traditional credential theft tactics.

Timeline

  1. 19.03.2026 14:43 1 articles · 3h ago

    Perseus Android Banking Malware Deployed with Note Monitoring and Real-Time Device Takeover Capabilities

    A new Android malware family, Perseus, has been deployed in the wild with capabilities that enable real-time device takeover and targeted extraction of sensitive data from note-taking applications. The malware leverages Accessibility Service abuse for granular interaction with infected devices, including commands for VNC-like screen streaming, hierarchical UI manipulation, and keystroke interception. Perseus monitors note-taking apps such as Google Keep, Samsung Notes, and Microsoft OneNote, expanding traditional credential theft tactics. Campaigns primarily target regions including Turkey and Italy, with distribution facilitated via IPTV-themed dropper apps hosted on phishing sites to lower user suspicion.

    Show sources

Information Snippets