New Albiriox Malware Hits 400+ Apps

Albiriox Malware Overview

New Albiriox malware now threatens Android users with broad fraud capabilities. Therefore, many researchers warn that its rapid spread demands urgent attention. The malware appears under a subscription-based criminal service that offers sophisticated on-device fraud tools.

The malware includes a hard-coded list of more than 400 targeted apps. These apps cover banking, payments, trading, and digital wallets. However, the attackers hide the malware inside deceptive dropper apps delivered through social engineering.

Distribution and Criminal Operations

Researchers report that Albiriox first appeared in late 2025 during a small recruitment phase. Soon after, it shifted to a subscription model that made the malware widely accessible. Consequently, attackers with minimal skills can now run advanced fraud operations.

The malware’s creators provide a custom builder that integrates with third-party encryption tools. This integration helps evade antivirus checks and mobile defenses. Furthermore, the subscription costs roughly $720 per month, which signals its value in criminal markets.

Initial Infection Tactics

Attackers often use fake websites and messages to lure victims. For example, one campaign targeted Austrian users with German-language SMS links. These links led to fake app pages designed to resemble trusted platforms.

Users who press “Install” unknowingly download a dropper app. The app then requests permissions disguised as a software update. Once granted, the main malware installs silently and begins its operations.

Remote Control and Data Theft

Albiriox connects through an unencrypted command channel. Therefore, attackers can issue real-time device commands. They can extract sensitive data, manipulate screens, or run virtual remote sessions.

The malware also installs a remote-access module built around accessibility services. This module allows attackers to view the full interface, even when apps block screenshots. As a result, they can bypass protections designed to stop screen capture.

Overlay Attacks and Additional Campaigns

Albiriox supports overlay attacks to steal login details from targeted apps. It can also show fake system updates or black screens. These distractions hide malicious activity in the background.

Another distribution method sends users to a fake coupon site that collects phone numbers. Attackers then send malicious links through messaging channels. Moreover, stolen numbers are forwarded to an automated bot.

Related Malware Trends

Investigators also highlight other malware-as-a-service threats emerging at the same time. For example, another tool disguised as a file manager offers remote access, surveillance, and file theft. These tools rely heavily on accessibility abuse, background permissions, and deceptive designs.

Attackers also distribute malware through fake app stores, adult-content lures, and multi-stage websites. These sites use obfuscation, encryption, and timing checks to evade analysis.

How to Protect Yourself

Users should avoid installing apps from unfamiliar links, even when they appear trusted. They should also enable automatic security checks and keep devices updated. Additionally, expert security services can detect malicious overlays, block unauthorized remote access, and monitor risky permissions to prevent fraud before it occurs.

Sleep well, we got you covered.

Scroll to Top