New FvncBot Android banking trojan targets Poland #1639
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Overview & Targeting
FvncBot is a newly observed Android banking trojan first seen on Nov. 25, 2025, distributed via a malicious loader app impersonating mBank’s Polish app “Klucz bezpieczeństwa Mbank” (Security key Mbank). The loader’s only purpose is to covertly install and bootstrap a second-stage payload (com.fvnc.app), which Intel 471 named FvncBot. Both loader and payload are heavily obfuscated using the commercial apk0day crypting service, attributed to the GoldenCrypt actor,...
🔧 Technical Details
Abusing Session-Based Package Installer for Second-Stage Payloads
The loader embeds a second-stage APK in its
assets/directory and uses Android’s session-based package installer APIs to extract and install it at runtime. By opening an install session, streaming the APK bytes, and committing the session programmatically, an attacker can bypass newer Android 13+ restrictions that hinder accessibility- or UI-driven silent installs. Any malicious loader can replicate this to drop additional APKs without relying on classic, more easily detectable install flows.Social-Engineering Users into Enabling Malicious Accessibility Services
The payload presents a guided wizard and deep-link to Accessibility Settings, convincing users to enable its Accessibility Service under the pretext of “proper functioning” or “security.” Once enabled, the service can monitor all relevant
AccessibilityEvents, read text from input f...🤖 Agent Actions
Summary:
accessibility-services-abuse.mdwith modern Android banking-Trojan TTPs from the Intel 471 FvncBot report, including session-based second-stage installation viaPackageInstaller, accessibility-driven keylogging buffers, WebView overlay phishing with JS bridges, and FRP/WebSocket-driven HVNC streaming.Tests: Not run (not applicable).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.