Zimperium, the world pioneer in mobile security, reveals new zLabs research detailing an advanced evolution of the GodFather Android banking Trojan that weaponizes on-device virtualization to hijack nearly 500 legitimate mobile applications.

The technique allows attackers to run the real app inside a malicious sandbox, capture every tap and credential in real time, and bypass traditional overlay-based defenses.

GodFather Android banking Trojan

The following are some features of the GodFather Android banking Trojan:

  • Perfect deception: Users interact with the genuine app, making visual detection impossible.
  • Full account takeover: Attackers harvest usernames, passwords, device PINs—even lock-screen credentials.
  • Rapid industry spillover: Although the latest wave focuses on a dozen Turkish financial institutions, any sector that relies on mobile apps—finance, retail, healthcare, government—faces identical risk.
  • Evasive by design: GodFather layers ZIP-format tampering, accessibility abuse, and Xposed-based hooking to blind static scanners and root-detection checks.

Defending from mobile attackers

Mobile attackers are moving beyond simple overlays; virtualization gives them unrestricted, live access inside trusted apps,” said Fernando Ortega, Senior Security Researcher, Zimperium zLabs.

Enterprises need on-device, behavior-based detection and runtime app protection to stay ahead of this shift toward a mobile-first attack strategy.”

Understand how converged physical and cybersecurity systems can scale protection.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...