New Android Malware ‘Fantasy Hub’ Spies on Users’ Calls, Contacts, and Messages

New Android Malware ‘Fantasy Hub’ Spies on Users’ Calls, Contacts, and Messages

Russian-based threat actors are actively distributing a sophisticated Android Remote Access Trojan called “Fantasy Hub” via Telegram-based Malware-as-a-Service channels, marking a significant escalation in mobile-focused cybercrime.

Fantasy Hub represents a dangerous convergence of advanced evasion techniques, social engineering tactics, and deep system-level access.

Security researchers from Zimperium’s zLabs have documented extensive capabilities of this spyware, which operates under a paid subscription model designed to lower barriers to entry for novice attackers seeking to compromise Android devices at scale.

The malware can exfiltrate SMS messages, contacts, call logs, images, and videos while maintaining the ability to intercept, modify, and delete incoming notifications.

Threat actors leveraging this toolkit have specifically targeted financial institutions including Alfa-Bank, PSB, Tbank, and Sber by deploying custom phishing windows that masquerade as legitimate banking applications to harvest credentials.

The operational structure of Fantasy Hub demonstrates how Malware-as-a-Service platforms democratize sophisticated cybercrimes.

Buyers can select the icon, name, and page they wish to impersonate to receive a specific page.

The developer advertises the malware alongside comprehensive documentation, instructional videos, and automated subscription management through a dedicated Telegram bot.

Potential buyers can select subscription tiers that grant access to the malware builder, allowing threat actors to customize and deploy instances targeting specific victims.

The seller even provides detailed instructions on creating counterfeit Google Play Store pages and bypassing Android security restrictions, complete with fabricated reviews to increase legitimacy.

This subscription approach has proven remarkably effective at attracting buyers with varying technical skill levels.

The Telegram bot manages subscription periods, device assignments, and command-and-control access through an intuitive interface.

Threat actors upload their chosen APK file to the builder, which automatically injects the Fantasy Hub dropper before deployment.

Various option in the bot.
Various option in the bot.

This automation significantly reduces the technical complexity required to launch coordinated attacks against financial institutions and enterprise users.

Exploitation Techniques

The technical architecture of Fantasy Hub incorporates multiple sophisticated evasion strategies designed to bypass detection mechanisms and security analysis.

The malware embeds a native dropper within the metamask_loader library that accesses encrypted assets at runtime.

During execution, a custom XOR-based decryption routine using a fixed 36-byte key pattern decrypts the payload stored in a file named metadata.dat, which is subsequently decompressed using gzip compression.

 Decryption routine used by the spyware. Decryption routine used by the spyware.
 Decryption routine used by the spyware.

This approach significantly reduces static indicators by keeping the actual payload encrypted until runtime execution on the victim’s device.

The command and control panel displays various details, including the remaining subscription time, online/offline device status, and device-specific information.

C2 panel with different device information.C2 panel with different device information.
C2 panel with different device information.

A hazardous exploitation technique involves abusing the default SMS handler role. Unlike individual runtime permissions requiring separate user approval, becoming the SMS handler role grants unified access to SMS content, contacts, camera functions, and file access through a single authorization step.

Real-Time Surveillance and Financial Targeting

Fantasy Hub leverages WebRTC technology to enable real-time audio and video streaming directly to command-and-control servers without requiring separate permissions.

The dropper masquerades as a Google Play System Update to reduce user suspicion, and recent samples include root detection and installation environment checks designed to evade dynamic analysis and sandbox environments.

From Google play update to requesting default SMS permission.From Google play update to requesting default SMS permission.
From Google play update to requesting default SMS permission.

The malware displays a subtle “Live stream active” indicator to prevent the device from entering sleep mode, then silently disables camera and microphone access once streaming concludes.

Once victims enter credentials through these phishing interfaces, the stolen information is immediately exfiltrated to attacker-controlled servers.

Threat actors managing compromised devices access a Russian-language command-and-control panel that displays device status, remaining subscription time, and comprehensive device information including brand, model, SIM slot assignments, and last activity timestamps.

The financial targeting capabilities represent perhaps the most immediate threat to enterprise organizations and individual consumers.

Threat actors deploy pre-built phishing windows disguised as legitimate banking applications, and the seller provides instructional videos demonstrating how to create custom windows with fully customizable fields for PIN numbers, passwords, and card details.

The emergence of Fantasy Hub underscores the critical need for comprehensive mobile threat defense strategies, particularly in bring-your-own-device environments where personal and corporate mobile usage intersect.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link