Android Malware Uses Hugging Face To Distribute

Bitdefender researchers identified an Android campaign that uses counterfeit security apps as first-stage droppers for TrustBastion remote access Trojans, delivering final payloads via Hugging Face's public hosting. Attackers use scareware ads and fake threat alerts to trick users into installing the dropper, which fetches staged APKs from Hugging Face and rotates thousands of package variants to evade detection while targeting banking and payment credentials.
Scoring Rationale
High novelty and credible Bitdefender findings, but limited mitigation specifics and primarily focused on mobile banking targets.
Practice with real Banking data
90 SQL & Python problems · 15 industry datasets
250 free problems · No credit card
See all Banking problemsStep-by-step roadmaps from zero to job-ready — curated courses, salary data, and the exact learning order that gets you hired.
Sources
- Read OriginalThreat Actors Leverage Hugging Face to Spread Android Malware at Scaleitsecuritynews.info



