New Android Malware Sells for $720 a Month, Targets 400+ Banking Apps

New Android Malware Sells for $720 a Month, Targets 400+ Banking Apps - Professional coverage

According to Infosecurity Magazine, a new Android malware family called Albiriox is being promoted as a Malware-as-a-Service (MaaS) on Russian-speaking cybercrime forums. It launched from a private beta in September 2025 to a public model in October, with subscription access starting at $650 per month before rising to $720 after October 21. The malware is designed for On-Device Fraud (ODF) and already targets over 400 banking and cryptocurrency applications globally. Its first observed campaign used SMS links to German-language phishing pages for Austrian users, deploying a malicious dropper app called “Penny Market.” Once installed, Albiriox connects to a command server and can take full remote control of the infected device.

Special Offer Banner

The Business of Bad Software

Here’s the thing that really stands out: this isn’t some lone hacker’s project. Albiriox is a full-blown, subscription-based business. For $720 a month, any aspiring criminal can get in on the action. That’s a pretty clear price point for a terrifyingly powerful tool. The shift from a private beta to a public MaaS model in just a month shows how quickly these operations are professionalizing. They’re not just selling malware; they’re selling a service with customer support, updates, and even a custom builder integrated with a crypting service called Golden Crypt to evade detection. It’s basically a SaaS startup, but for fraud.

How The Attack Works

The delivery method is clever and multi-stage, which makes it harder to stop. It doesn’t just try to install the main payload right away. First, you get a dropper app—in one case, disguised as a Penny Market app from a fake Google Play site. That dropper uses obfuscation and tricks you into enabling “Install Unknown Apps.” Only then does it pull down the real Albiriox malware. Later campaigns got even more targeted, using a phone-number collection scheme that only sent download links via WhatsApp to confirmed Austrian numbers. That’s a scary level of precision. Once it’s on your device, the malware registers it with a server and gives the attacker remote control to see your screen and interact with your apps in real time. You can read the full technical breakdown from the researchers at Cleafy Threat Intelligence.

Why This Is A Big Deal

This represents an accelerating shift in the cybercrime world. The focus is squarely on On-Device Fraud (ODF). Why try to steal credentials and use them elsewhere when you can just operate the victim’s phone directly? You can bypass all sorts of security measures like 2FA because you’re *on* the device where the authentication happens. With a target list of 400+ financial apps, the potential damage is huge. And the MaaS model means the barrier to entry for criminals is lower than ever. You don’t need to be a master coder; you just need a subscription fee. So, what’s the defense? Cleafy argues financial institutions need “multi-dimensional visibility” to detect these compromises early. But for the average user, it’s the old rules: be incredibly skeptical of SMS links and never sideload apps from random websites, no matter how legit they look.

Leave a Reply

Your email address will not be published. Required fields are marked *