New Android Malware Masquerades as FSB Antivirus to Spy on Executives

Aug 25, 2025

Overview

A newly discovered Android malware campaign is masquerading as antivirus software purportedly created by Russia’s Federal Security Service (FSB), specifically targeting executives in Russian businesses. The spyware, tracked as Android.Backdoor.916.origin, blends a guise of legitimacy with highly invasive spying capabilities.

Key Facts at a Glance

Detail

Description

Malware Name

Android.Backdoor.916.origin

Target Victims

Executives at Russian businesses

Branding Variants

“GuardCB” (posing as Central Bank software), “SECURITY_FSB”, and “ФСБ”

Capabilities

Live camera streaming, conversation recording, keylogging, data exfiltration from messaging apps

Discovery Timeline

First identified in January 2025; researchers observed multiple subsequent versions indicating ongoing development

Inferred Motivation

Targeted espionage within Russia—supported by Russian-only antivirus interface and branding choices

Technical Breakdown & Threat Analysis

  1. Deceptive Branding & Social Engineering
    The malware impersonates trusted authorities—such as the Central Bank (“GuardCB”) and Russia’s FSB—boosting credibility and increasing the likelihood of installation by high-value targets.

  2. Advanced Surveillance Features

    • Camera streaming: Enables real-time video feed from the device’s camera.

    • Audio capture: Records calls and ambient conversations.

    • Keylogging: Captures user input to harvest credentials and sensitive text.

    • Messenger eavesdropping: Extracts communication data from messaging applications.

  3. Continuous Development & Evasion Capabilities
    Multiple iterations since January 2025 suggest active refinement by threat actors to stay ahead of detection.

  4. Highly Targeted Campaign
    The combination of narrow targeting (executives), Russian-only interface, and FSB-style branding indicates a bespoke espionage operation. Not a widespread mass campaign.

Implications for Organizations & Individuals

  • High-risk Exposure: Executives and insiders within Russian industries may already be compromised without clear signs of infection.

  • Difficulty to Detect: The authoritative branding makes the spyware more deceptive, and the evolving nature of the malware suggests detection challenges using standard security tools.

  • Potential for Credential Theft & Data Loss: With capabilities like keylogging and live camera access, attackers can exfiltrate highly sensitive information in real time.

Mitigation Recommendations

  • Strict Installation Policies: Only allow installation of verified apps from trusted sources. Prohibit any software that claims to originate from government agencies unless officially validated.

  • Mobile Threat Defense (MTD): Deploy advanced MTD tools capable of detecting anomalies such as unauthorized camera access or suspicious keylogging behavior.

  • App Permissions Monitoring: Watch over apps requesting camera, microphone, or accessibility permissions—especially if they appear under unfamiliar developer names.

  • Behavioral Analysis & Threat Intelligence: Leverage endpoint detection platforms to flag irregular behavior (e.g., data exfiltration to unknown servers). Integrate threat feeds focusing on mobile spyware variants.

  • Security Awareness: Educate executives about the dangers of installing unverified apps—even those that seem official or come via trusted-looking links.

Bottom Line

Android.Backdoor.916.origin represents a sophisticated and evolving espionage tool disguised as a familiar antivirus app. Tailored for surveillance, it poses elevated risks for targeted individuals within Russia. Proactive mobile security practices and heightened vigilance are essential for mitigating this threat.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries
Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries
Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries
Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Oct 10, 2025

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign
New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign
New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign
New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

New Android Spyware “ClayRat” Masquerades as WhatsApp, TikTok & YouTube in Global Espionage Campaign

Oct 10, 2025

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities
CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities
CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities
CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

CISA Urges Immediate Patching as ArcaneDoor Hackers Exploit Three Cisco Zero-Day Vulnerabilities

Sep 26, 2025

Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard
Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard
Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard
Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard

Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard

Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard

Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard

Cyberattack Grounds Flights Across European Airports: Heathrow, Brussels, Berlin Hit Hard

Sep 22, 2025

Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign
Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign
Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign
Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign

Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign

Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign

Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign

Fake Meta “Account Suspension” Emails Deliver StealC Malware via FileFix Phishing Campaign

Sep 19, 2025

ShinyHunters Breach Exposes 1.5 Billion Salesforce Records via Drift OAuth Hack
ShinyHunters Breach Exposes 1.5 Billion Salesforce Records via Drift OAuth Hack
ShinyHunters Breach Exposes 1.5 Billion Salesforce Records via Drift OAuth Hack
ShinyHunters Breach Exposes 1.5 Billion Salesforce Records via Drift OAuth Hack

ShinyHunters Breach Exposes 1.5 Billion Salesforce Records via Drift OAuth Hack

ShinyHunters Breach Exposes 1.5 Billion Salesforce Records via Drift OAuth Hack

ShinyHunters Breach Exposes 1.5 Billion Salesforce Records via Drift OAuth Hack

ShinyHunters Breach Exposes 1.5 Billion Salesforce Records via Drift OAuth Hack

Sep 18, 2025

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.