Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Hugging Face abused to spread thousands of Android malware variants
    Cybersecurity

    Hugging Face abused to spread thousands of Android malware variants

    adminBy adminJanuary 30, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Hugging Face abused to spread thousands of Android malware variants
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hugging Face abused to spread thousands of Android malware variants

    A new Android malware campaign is using the Hugging Face platform as a repository for thousands of variations of an APK payload that collects credentials for popular financial and payment services.

    Hugging Face is a popular platform that hosts and distributes artificial intelligence (AI), natural language processing (NLP), and machine learning (ML) models, datasets, and applications.

    It is considered a trusted platform unlikely to trigger security warnings, but bad actors have abused it in the past to host malicious AI models.

    Wiz

    The recent campaign discovered by researchers at Romanian cybersecurity company Bitdefender leverages the platform to distribute Android malware.

    The attack begins with victims being lured to install a dropper app called TrustBastion, which uses scareware-style ads claiming that the target’s device is infected. The malicious app is disguised as a security tool, claiming to detect threats such as scams, fraudulent SMS messages, phishing attempts, and malware.

    Immediately after installation, TrustBastion shows a mandatory update alert with visual elements that mimic Google Play.

    Fake Google Play page
    Fake Google Play page
    Source: Bitdefender

    Instead of directly serving malware, the dropper contacts a server linked to trustbastion[.]com, which returns a redirect to a Hugging Face dataset repository hosting the malicious APK. The final payload is downloaded from Hugging Face infrastructure and delivered via its content distribution network (CDN).

    To evade detection, the threat actor uses server-side polymorphism that generates new payload variants every 15 minutes, Bitdefender says. 

    “At the time of investigation, the repository was approximately 29 days old and had accumulated more than 6,000 commits.”

    During analysis, the payload-serving repository was taken down, but the operation resurfaced under a new name, ‘Premium Club,’ which used new icons while retaining the same malicious code.

    The main payload, which lacks a name, is a remote access tool that aggressively exploits Android’s Accessibility Services, presenting the request as necessary for security reasons.

    Accessibility Services request
    Accessibility Services request
    Source: Bitdefender

    This gives the malware the ability to serve screen overlays, capture the user’s screen, perform swipes, block uninstallation attempts, and more.

    In this case, Bitdefender says the malware monitors user activity and captures screenshots, exfiltrating everything to its operators. The malware also displays fake login interfaces impersonating financial services such as Alipay and WeChat to steal credentials, and also attempts to steal the lock screen code.

    Phishing overlays
    Phishing overlays for Alipay PIN (left) and unlock screen PIN (right)
    Source: Bitdefender

    The malware remains connected at all times to the command-and-control (C2) server, which receives the stolen data, sends command execution instructions, configuration updates, and also pushes fake in-app content to make TrustBastion appear legitimate.

    Bitdefender informed Hugging Face about the threat actor’s repository, and the service removed the datasets containing the malware. Researchers also published a set of indicators of compromise for the dropper, the network, and malicious packages. 

    Android users should avoid downloading apps from third-party app stores or installing them manually. They should also review the permissions an app requests and ensure all of them are necessary for the app’s intended functionality.


    Wiz

    It’s budget season! Over 300 CISOs and security leaders have shared how they’re planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026.

    Learn how top leaders are turning investment into measurable impact.

    abused Android Face Hugging Malware spread thousands variants
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThe SEO Cost Of Slow WordPress Site & How It Affects AI Visibility
    Next Article Gmail 2025.12.29.855932688.Release APK Download by Google LLC
    admin
    • Website

    Related Posts

    Star Citizen game dev discloses breach affecting user data

    March 3, 2026

    Researchers Uncover Method to Track Cars via Tire Sensors

    March 3, 2026

    SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Star Citizen game dev discloses breach affecting user data

    March 3, 2026

    Samsung seems very committed to putting Exynos in every future Galaxy

    March 3, 2026

    Researchers Uncover Method to Track Cars via Tire Sensors

    March 3, 2026

    How to revise your old content for AI search optimization

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (574)
    • Privacy & Online Earning (80)
    • SEO & Digital Marketing (358)
    • Tech Tools & Mobile / Apps (710)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Star Citizen game dev discloses breach affecting user data

    March 3, 2026

    Samsung seems very committed to putting Exynos in every future Galaxy

    March 3, 2026

    Researchers Uncover Method to Track Cars via Tire Sensors

    March 3, 2026
    Most Popular
    • Star Citizen game dev discloses breach affecting user data
    • Samsung seems very committed to putting Exynos in every future Galaxy
    • Researchers Uncover Method to Track Cars via Tire Sensors
    • How to revise your old content for AI search optimization
    • Best High-Yield Checking Accounts for March 2026
    • This amazing ESP32 projector integrates with Home Assistant and displays whatever you want
    • SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More
    • Google Clarifies How It Picks Thumbnails For Search, Discover
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.