Cybersecurity researchers have detected a new Android Trojan that targets financial operations through remote device control. Known as Massiv, this malicious software is disguised as IPTV applications to gain the confidence of those looking to watch online television and ends up running a series of techniques aimed at emptying accounts or supplanting identities.
Massiv does not just steal credentials in a traditional way: combines screen capture, key recording and overlapping of false interfaces to fool the user and capture sensitive data, including card numbers and PIN. For screen transmission take advantage of the Android MediaProjection API, a legitimate functionality designed to share the screen but that in wrong hands facilitates visual theft of what appears on the device ( official documentation of MediaProjection).

When a legitimate app tries to prevent catches, Massiv uses a quieter method: it uses accessibility services to read the structure of the user interface. By going through the window trees and accessibility nodes, malware builds a JSON representation of visible content - texts, descriptions, positions and what elements are interactive - and sends that information to the attacker, which can thus decide which actions to automate.
This ability to "see" and manipulate the screen is complemented by black screens that hide the malicious activity of the user, the possibility of silencing the device, simulating touches and slides, altering the clipboard and even unlocking the phone if you know or get the pattern. In addition, you can download specific overlaps for bank or identity applications and run package facilities without being easily perceived by the victim.
A worrying example identified by analysts is the use of these overlaps to attack public administration applications. In Portugal, campaigns have been observed that attempt to deceive users of the official app gov.pt associated with the management of Key Digital Movel, to order the phone number and the PIN and thus avoid verification controls. With this data, the criminals have managed to open bank accounts in the name of the victims and use them as vehicles to whiten money or claim credit.
The distribution of Massiv is usually done through "droppers": applications that appear to be IPTV players or services and that come by SMS messages with phishing links. When opened, the application shows a legitimate page within a WebView while, in the background, the malicious component that requests permission to install applications from unknown sources and to access SMS and other critical functions has already been installed.
The pattern is not new, but it is disturbing for its sophistication.. The abuse of accessibility services to automate fraud and overlap technique have been used by bank malware families on Android for years. Massiv adds to this repertoire a modular set of remote commands and the ability to download packages with templates to target specific applications, suggesting that its authors are professionalizing the tool.
The technical reports that have described this Trojan point to targeted campaigns in countries such as Spain, Portugal, France and Turkey. In addition, the signs in the code - for example, the introduction of API keys for communication with the server - suggest that its operators could end up offering it as a service for other cybercriminals, a model known as Malware- as- a- Service.
For users, there are practical measures that reduce risk: avoid installing applications from links received by SMS, always check that an app comes from official stores, keep the operating system and apps up-to-date and review the permissions that request an application. Activate automatic protections like Google Play Protect and distrust requests that ask for high permissions for "important updates" when the source is not verifiable ( information about Play Protect).

If you have a bank app, make sure you use the bank's official channels and activate multiple factor authentication when available. In the light of the suspicion of a fraud or if you notice foreign transactions, contact your financial institution immediately and consider the option of restoring devices committed to factory settings after keeping copies of what is necessary.
The appearance of Massiv recalls that the mobile ecosystem remains a lucrative goal and that tactics evolve rapidly. For those who want to deepen technical analysis and detection, the researchers who documented this campaign have published a detailed report with indicators and observations ( report by ThreatFabric), and the specialized media have replicated and contextualized their findings ( The Hacker News).
The lesson It is clear: applications that mimic popular services, such as TV players, are a regular way to introduce threats. Caution and good practice when installing software remain the first line of defense against increasingly automatic and powerful tools designed to take over our phones and, with them, our money and our identity.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...