Summary is AI-generated, newsdesk-reviewed
  • DoubleTrouble trojan uses Discord-hosted APKs, marking social media as malware delivery channels.
  • Evasive Trojan steals credentials, records screens, and mimics apps using obfuscation techniques.
  • Real-time, on-device protection is crucial as mobile threats like DoubleTrouble evolve rapidly.

Zimperium, the world's pioneer in mobile security, announced new findings from its zLabs team on an evolving mobile banking trojan dubbed DoubleTrouble. 

The malware, which disguises itself using random two-word method names, has rapidly grown in sophistication—adding screen recording, advanced keylogging, and new UI overlay capabilities designed to steal credentials and manipulate infected devices.

Discord-hosted APKs

Initially spread viaphishing sites posing as European banks, DoubleTrouble now leverages Discord-hosted APKs

Originally spread through phishing sites posing as European banks, DoubleTrouble now leverages Discord-hosted APKs to distribute malware in its latest campaign. This shift marks a disturbing trend toward social media platforms being used as delivery channels for mobile malware.

Using obfuscation techniques and Android’s Accessibility Services, DoubleTrouble bypasses traditional detection methods and silently performs a range of malicious actions, including:

  • Stealing lock screen credentials using fake UI overlays
  • Recording screen content to capture usernames, passwords, and OTPs
  • Blocking legit banking and security apps with fake “system maintenance” messages
  • Logging every keystroke in real time
  • Mimicking trusted apps with tailored HTML overlays to phish sensitive data

Dynamic delivery methods

As attackers shift to mobile-first strategies and use dynamic delivery methods like Discord to evade traditional defenses, organizations need real-time, on-device protection,” said Kern Smith, VP of Solutions Engineering at Zimperium. 

DoubleTrouble is a stark reminder that mobile threats are growing more evasive and more dangerous, targeting everything from banking credentials to cryptocurrency wallets.”

Stay ahead of the trends on securing physical access control systems through layered cybersecurity practices.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...