Crypto trojans target 800+ wallets and banking apps via fake logins

A Zimperium zLabs report warns of a new crypto trojan wave aimed at 800+ cryptocurrency wallets, banking apps, and social platforms on Android. The malware families are RecruitRat, SaferRat, Astrinox, and Massiv, each tied to its own command-and-control infrastructure. Once installed, the crypto trojan uses overlay attacks to place fake login screens on top of real crypto and banking apps, enabling real-time credential theft. It can also intercept one-time passcodes (OTPs), stream the victim’s device screen to attackers, hide its app icon, and block uninstall attempts. Infection commonly starts through phishing sites, fake job offers that redirect to malicious APK downloads, SMS/text-message scams, and social-engineering lures that pressure victims to act quickly. One campaign uses fake premium streaming sites; others rely on recruitment-style bait and domain-based content switching. To evade security tools, the crypto trojan families reportedly use advanced anti-analysis methods, structural tampering with Android APKs, and near-zero detection rates against traditional signature-based defenses. Their network traffic blends into normal activity using HTTPS and WebSocket, sometimes with extra encryption. The report also notes multi-stage installation strategies designed to work around Android permission changes. Traders’ takeaway: the headline is not a protocol or price catalyst, but a security risk that can increase exchange/wallet losses and trigger short-lived risk-off sentiment—especially for users installing Android apps outside official stores.
Bearish
这条消息的核心是“加密木马”针对大量钱包与银行类 App 的现实安全威胁,而不是链上/宏观基本面变化。对市场情绪的影响通常偏短期:一旦出现大规模凭证盗取、OTP 拦截与屏幕投放,容易诱发用户对交易所/托管钱包与手机端资产管理的信心回落,带来风险偏好下降(bearish)。 类似事件在过往往往带来同类交易反应:当发生大规模移动端木马、钓鱼活动或账户接管(ATO)报道时,短期常见表现是资金更偏向“降风险”的托管策略、提高安全操作(如更换设备/启用风控),同时成交量与波动可能短暂上升。 不过从长期看,木马事件不直接改变 BTC/ETH 等资产的供需或协议安全,只会主要影响用户侧损失与平台侧风控成本。因此整体更像“安全事件的情绪扰动”,而非趋势性基本面利空。综合考虑,该新闻对市场的预期影响为偏 bearish 但可能较快消化。