Android Trojan that masquerades as services: complete guide

Last update: 26/03/2026
Author Isaac
  • Android Trojans disguise themselves as legitimate services or apps to steal data, money, and control the device through accessibility and other critical permissions.
  • Families like Android.Phantom, Triada, RatOn, BRATA, and Joker use modified games, adulterated firmware, and fake banking apps to infect mobile phones en masse.
  • Abnormal battery and data consumption, unknown apps, premium charges, and overheating are typical signs of malware infection on Android.
  • Download only from official sources, check permissions, update the system, and use a reliable security app drastically reduces the risk of falling for these Trojans.

Trojan for Android that masquerades as services

The Trojans for Android that pose as legitimate services They have become one of the most serious threats to anyone who uses a mobile phone to chat, play games, shop, or manage their bank accounts. We're not just talking about annoying viruses that display ads, but extremely advanced malware families capable of remotely control the device, steal money, spy on conversations, and even erase the phone. to leave no trace.

In recent years, various campaigns have been discovered that take advantage of fake apps, manipulated firmware, modified games, or pirated versions of popular applications To sneak in these types of Trojans: Android.Phantom, Triada, BRATA, RatOn, Joker, and variants of banking Trojans that use accessibility services. They all share something in common: They disguise themselves as something seemingly harmless so that the user lowers their guard and grants them critical permissions that open the door to the entire system. To detect deep compromises such as tampered firmware, specialized tools are recommended (Use MVT to find out if your Android has been hacked).

What is an Android Trojan and why is it so dangerous?

A Trojan horse, or Trojan horse on AndroidA Trojan horse is a type of malware that disguises itself as a useful app or file to trick the user into installing it voluntarily. Unlike other types of malware, a Trojan horse doesn't usually spread on its own; leverage user trust in an app, a game, a link, or a supposed service to enter the system.

On Android, these Trojans can masquerade as banking apps, productivity tools, media players, games, messaging apps, or even system updatesOnce inside, the goal is usually to steal credentials, financial data, SMS verification codes, or hijack social media accounts. sending spam or using your mobile phone as part of a compromised device network.

To achieve this, many of these malware programs abuse the Android Accessibility Services, a feature designed to help people with visual or mobility difficulties, but which also allows the attacker to read what is on the screen, press virtual buttons, grant themselves new permissions and even install other applications without the user having to intervene.

Furthermore, modern Trojans often include additional modules capable of Change browser links, intercept notifications, record the screen, activate a background proxy server, or clone NFC data to carry out advanced fraud. The result is that your mobile phone can end up being just another tool in the hands of cybercriminals.

Android.Phantom: the Trojan that uses machine learning and hides in games and mods

One of the most striking recent families is Android.PhantomDetected by researchers at the cybersecurity lab Doctor Web. This Trojan is primarily distributed through Modified popular games and applicationsand stands out because it incorporates techniques of machine learning to automate their malicious activity.

Android.Phantom can operate in two different modes, which are activated according to the commands of a remote command and control server: ghost mode y signaling modeThanks to these two operating profiles, the malware is capable of both generating advertising fraud and using the infected device for much more serious activities, such as distributed denial-of-service (DDoS) attacks or covert data sharing.

In the call ghost modeThe Trojan loads web content in the background and simulates clicks on malicious ads using automation scripts that rely on TensorFlowJS, a machine learning framework for JavaScript. All of this happens without the user seeing anything on the screen, which makes it extremely difficult to identify that something is wrong.

When activated signaling modeAndroid.Phantom is capable of exchange data, audio and video in real time without the need to install any new programs. In this way, the compromised mobile phone can become an active node within an abuse infrastructure, for example to coordinate attacks, retransmit content, or serve as a springboard for other online crimes.

The great danger of this family is not only advertising fraud, but the massive use of infected phones as tools for sending spam, participating in online scams, launching DDoS attacks, or stealing personal informationAlthough many of these actions are silent, they often leave clues: unusually high battery consumption, increased mobile data traffic without a clear explanation and a much slower overall performance.

According to Doctor Web, the Android.Phantom distribution campaign is particularly affecting Xiaomi devicesThe Trojan has been found in applications available in the official store. We Store, uploaded by a developer identified as Shenzhen Ruiren NetworkIn many cases, the apps were initially published without malicious code and a A subsequent update introduced the Trojan horseThis builds trust among users before the infection is executed.

In addition, variants of Android.Phantom have been detected spreading through modified versions of Spotify promising free premium features. These modified versions are distributed through Telegram channels and unofficial pages, a classic way to hook those looking to circumvent the limitations of legitimate apps.

Experts strongly recommend Do not download modified APKs from websites or Telegram channels of dubious origin, maintain a updated antivirus on the phone and monitor the device's behavior. If infection is suspected, it's advisable to boot the phone into safe modeManually review the list of installed applications, uninstall any suspicious programs, and activate Google Play Protect to perform a security analysis.

  How can I disconnect my iPhone from my Mac computer?

Triada: the Trojan that comes pre-installed in the firmware and controls all your apps

If Android.Phantom already sounds worrying, the family Triada It goes a step further. Initially detected in 2016 by Kaspersky experts, Triada marked a turning point in the Advanced mobile malware for AndroidThis threat is injected into almost every process running on the device, resides primarily in RAM, and is capable of intervene in multiple applications at the same time.

Over time, Google and manufacturers strengthened system security, even restricting modifications to system partitions for users with root privileges. However, the actors behind Triada They evolved the technique and they began to infect the firmware in the supply chain, that is, before the phone reaches the end user.

In the modern version, identified as Backdoor.AndroidOS.Triada.zThe Trojan comes pre-installed in the system partitions of counterfeit Android phones sold in online marketplaces. Because it's integrated at such a low level, removing it is almost impossible without Re-flash the official firmware or replace the device.

A key feature of this variant is that it can attack any app running on the phoneEach time a user opens an application, Triada inserts a copy of itself and can be activated on demand. It also includes specialized modules for Telegram, WhatsApp, Instagram, browsers, TikTok, Facebook, LINE, Skype, and cryptocurrency apps, Entre otras muchas.

Eg Telegram It downloads two modules: one that connects daily to the command and control server to send the victim's phone number and complete authentication data (including the access token), and another that filters all messages, communicates with a bot, and deletes notifications about new logins so that the user does not suspect anything.

En InstagramTriada searches for active session cookies and sends them to attackers, allowing take full control of the accountIn browsers like Chrome, Opera, or FirefoxThe module connects to the command server via TCP and redirects legitimate links to advertising sites or, if the attackers so decide, to phishing pages designed to steal credentials.

En WhatsAppThe Trojan has two modules: one that sends session data to the server every few minutes, facilitating access to the account, and another that It intercepts the sending and receiving functions of messages.In this way, the malware can send messages on behalf of the victim and delete them instantly, making it difficult to detect the malicious activity.

In apps like Reservation o Skype or WhatsappThe behavior is similar: collection of tokens, cookies, and internal data that allows criminals impersonate the user from other devices. TikTokTriada extracts information from cookies and the data necessary to interact with the platform's API.

But that's not all: Triad includes a SMS module capable of reading all incoming messages, extracting codes (e.g., bank verification codes), automatically replying to certain SMS messages to subscribe the victim to paid services and send arbitrary messages when the server so commands. Another complementary module disables Android's native protections against sending premium SMS messages without consent.

It also incorporates a call moduleintegrated into the phone app, which already partially implements functions of number spoofingAlthough it appears to still be under development, it aims to allow outgoing calls to display a different number than the real one, facilitating new scams.

Another very dangerous component is a reverse proxy This turns the phone into an intermediary server, giving attackers access to arbitrary IP addresses "as if" they originated from the victim's device. This allows them to conceal the true source of various illicit online activities.

For cryptocurrency users, Triada incorporates a clip which monitors the clipboard and automatically replaces copied wallet addresses with addresses controlled by the attackers. Furthermore, a cryptocurrency thief It analyzes the victim's activity and replaces addresses anywhere on the interface, even modifying buttons or images with QR codes to redirect funds. It is estimated that with these techniques, criminals have managed to steal hundreds of thousands of dollars in crypto assets.

Investigations show that, on the affected devices, the firmware name differs from the official one. just one letterFor example, where the legitimate firmware is TGPMIXM, the infected fake appears as TGPMIXN. Everything points to a engaged in some phase of the supply chainwith stores that sell seemingly new phones without knowing that they have been tampered with from the factory.

The best defense against Triad involves Buy phones only from official distributors.Check the firmware and install a trusted Android security solution. If Triada is detected, the recommended course of action is install the official firmware or contact a technical service, review all messaging and social media accounts, close any suspicious active sessions and change passwords with the help of a secure password manager. As part of that protection, it is advisable Install a trusted security solution for Android and follow good practices.

RatOn, BRATA and other banking trojans that impersonate services

Alongside Android.Phantom and Triada, other families of banking trojans for Android especially focused on stealing money and hijacking financial accounts. Three names worth keeping in mind are: RatOn, BRATA and Jokeras well as different variants of malware that disguise themselves as apps from services, banks or well-known platforms.

RatOn It is a relatively new Trojan horse designed from scratch for bank fraudIt started as a tool for NFC relay attacks (using techniques like Ghost Tap), but has evolved into a Remote Access Trojan (RAT) with automated transfer system (ATS) capabilities. This means it can Perform complete bank transfers automaticallywithout the user touching the screen.

This malware combines superposition attacks (fake screens that overlay legitimate apps), automated interface movements, NFC relaying, and accessibility abuse to control the phone. It is designed to steal accounts from cryptocurrency applications such as MetaMask, Trust Wallet, Blockchain.com, or Phantomand can automate money transfers through banking apps like George Česko, widely used in the Czech Republic.

  How to put Instagram filters on your Camera Roll photos

RatOn is distributed via Fake pages that imitate the Google Play Storewhere a supposed “TikTok 18+” version or similar is offered. Once the user installs the “dropper” app, it requests permissions to install applications from unknown sources and then downloads a second and third stage of malware, including a variant of NFSkate (also known as NGate), based on the legitimate NFCGate tool.

The Trojan requests permission from Device administrator, accessibility, contact reading and writing, and system settings controlThis allows you to grant new permissions, download additional components, record the screen, launch and control banking and cryptocurrency applications, and even display fake ransom notes that block the device and accuse the user of serious crimes to force them to open a cryptocurrency app and make a payment.

Among the commands that RatOn processes are commands to send fake push notifications (send_push), change screen lock time (screen_lock), open WhatsApp or Facebook, modify the target financial apps list (app_inject), send SMS via accessibility (send_sms), Download and run NFSkate (nfs), initiate ATS transfers (transfer), lock the device (lock), create contacts (add_contact) and start or stop screen recording sessions (record, screen).

For its part, BRATA It is a banking Trojan for Android discovered in 2019 that, over time, has incorporated very aggressive capabilities. It is distributed via a dropper which helps to evade antivirus software, and has shown a continued interest in banks and financial institutions from different countries.

The most recent variants of BRATA include a “off switch” This forces the device to perform a factory reset in two situations: after successfully completing bank fraud and when it detects that it is running in an analysis or emulator environment. This wastes the user's time trying to understand what happened, while the attackers consolidate the theft.

In addition, BRATA requests permits from GPS geolocationApparently, this is in preparation for future features such as targeting victims in specific countries or experimenting with specific payment methods (e.g., cardless cash withdrawals). In parallel, it has refined its techniques for obfuscation and dynamic download of its malicious core to evade detection by security solutions.

Another known name is Joker, malware that acts as spyware and silent subscriber to premium servicesJoker focuses on collecting SMS messages, contact lists, and device information, while also registering the mobile phone in SMS payment services without the owner's consent, generating unexpected charges on the bill.

Joker has become one of the most common mobile malwareespecially because it is distributed through malicious apps hosted on Google PlayMessaging, health, translation apps, and many other categories. Although Google removes these apps once detected, they have often already managed to gain access. thousands of downloadsAnd the authors republish new applications with the same malicious code.

In addition to these specific families, various studies have identified Banking trojans that masquerade as legitimate services (utility tools, productivity apps, supposed official banking apps, etc.). Once executed, these Trojans check if the device is genuine and request accessibility and administration permissions and from there, they take full control to read the screen, press buttons, fill out forms, Generate fake login screens for banking or cryptocurrency apps and send all the information to a remote server.

The attackers can then Update the malware, erase its traces, and silence notifications and sounds. so that the user does not see security alerts from their bank or Google, and to spread the infection to new regions, starting with areas like Southeast Asia but with the potential to expand globallyFor examples of other threats that act in a similar way, there are analyses of specific families such as Auto Color.

Other types of malware on Android and how they get onto your phone

Although banking trojans grab many headlines, Android also suffers from other types of malware. malware that often arrives disguised as services or utilitiesAmong the most common are adware, spyware, ransomware, and malicious cryptomining.

El adware It's unwanted software that floods your phone with ads, usually using deceptive tactics to install itself alongside other apps or by pretending to be a legitimate tool. Besides being annoying, it can divert traffic to dangerous websites and consume data and battery.

El spyware It focuses on discreetly spying on user activity: what apps they use, who they talk to, what they write, what sites they visit. All this information is sent to the attackers, who can use it to identity theft, extortion, or sale on black markets.

El ransomware On Android, this type of attack typically involves blocking access to the device or encrypting files, then demanding payment in cryptocurrency in exchange for restoring control to the user. Since mobile phones contain personal photos, private conversations, and often work data, this type of attack can be especially traumatic, and without backups, It's difficult to recover the information..

La malicious cryptomining Cryptojacking involves installing software that uses the mobile phone's processor to mine cryptocurrencies for attackers. The worst part is that it often goes unnoticed: only the most obvious signs of an attack are seen in the phone's hardware. Symptoms include a fast-moving battery, overheating, and poor performance.Meanwhile, the attacker is generating revenue at the expense of the device's resources.

In most cases, infections arrive through the browser or downloaded applicationsIn the browser, attackers can exploit vulnerabilities in web technologies or display malicious ads that execute code without the user doing anything other than visiting a compromised page. In apps, the classic tactic is... Trojan horse disguised as a legitimate appwhich may work as advertised but, "behind the scenes," steals data, installs other apps, or opens the door to more malware. If you see a Message that you have a virus when entering a website, is a typical sign of these campaigns (how to act in response to that warning).

  What does Judder mean on Samsung TV?

There are other options as well: budget phones with already infected firmwareemails with malicious attachments, phishing campaigns that push users to download fake “patches” or “updates”, and tech support scams that ask users to install “help” tools that are actually Trojans.

Signs that your Android device may be infected by a Trojan or malware

The most dangerous thing about many of these Trojans is that they are designed to to go unnoticed for as long as possibleEven so, there are several signs that may indicate that something strange is happening with your mobile phone and that it's worth investigating.

One of the most typical clues is the constant appearance of pop-up windows and adsEven when you're not browsing or using apps that have never displayed ads before. If tapping those ads takes you to strange or shady websites, it's quite likely that adware or some other malicious component is installed.

Another sign is a sudden and unexplained increase in mobile data consumptionMany Trojans need to transmit information to their servers (session data, keyloggers, screenshots, etc.) or display ads, which increases outgoing traffic. If your data bill spikes for no reason, something may be running in the background without your permission.

You should also be suspicious if you start to see unusual charges on the carrier's billespecially those related to premium SMS messages or calls to premium-rate numbers. This usually indicates that malware has managed to silently send messages or make calls to paid services to generate revenue for the attackers.

El accelerated battery wear Overheating is another classic symptom. Malware often makes intensive use of the CPU, network, and sometimes the GPU (in the case of cryptomining or screen recording), causing the phone to heat up and drastically reducing battery life. If the phone gets hot even when idle, it's worth investigating.

The presence of apps you don't remember installing This is also a serious indicator. Some Trojans automatically download other apps or hide behind generic “service” or “update” names. If you see anything suspicious in the app list, or unidentified icons, it’s best to check it out (for example, how to locate apps or recent activity).

Finally, pay attention to behaviors such as mobile phone use. Turn on only WiFi or mobile dataIf your contacts tell you they're receiving strange messages from your number, or if you notice extreme slowdowns for no apparent reason, these are all signs that an app might be causing problems. controlling the device behind your back.

How to protect your Android from Trojans that masquerade as services

The good news is that, with a few good safety habits With the support of a reliable protection app, you can greatly reduce the risk of infection with Trojans and other malware on Android. There's no need to become paranoid, but you should exercise some critical thinking and avoid clicking on everything that moves.

First of all, it is key Only install applications from trusted sourcessuch as the Google Play Store or, where applicable, the manufacturer's official app stores. Even so, you should be careful, because malicious apps sometimes slip through, but the risk is much lower than downloading APKs from unknown websites, forums, Telegram channels, or links in SMS messages and social media.

Before installing an app, it's advisable review your permissions carefullyIf a calculator app requests access to contacts, SMS messages, calls, or accessibility services, that's a red flag. The same goes for a flashlight app that wants to take over device administrator privileges. Always ask yourself, "Does it really need this permission to function?" If the answer is no, it's best to look for an alternative.

Another fundamental pillar is to maintain Android and updated appsUpdates fix vulnerabilities that many Trojans exploit to escalate privileges or bypass restrictions. Leaving your system outdated is like... close the door but leave the window open for the attackers.

It is also advisable to have one security or antivirus app for Android from a trusted provider. These tools detect and remove many known threats, alert you to suspicious behavior, scan browser links for phishing, and allow you to run on-demand scans when you suspect something is wrong.

In addition, some basic guidelines help to secure the device: Do not open attachments from unknown emailsAvoid clicking on strange links even if they seem to come from friends, be wary of calls asking for bank details or passwords, and do not install "updates" or "optimizers" that arrive through unexpected messages.

If at any point you suspect that your Android device may be infected, the best thing to do is Install an anti-malware solution and perform a full scanIn addition to restarting in safe mode, you can uninstall suspicious apps without them activating. In serious cases (for example, ransomware or very persistent Trojans), you might need to... factory reset deviceTherefore, having regular backups of photos, chats, and documents is essential.

The landscape of Android Trojans that masquerade as legitimate services is becoming increasingly complex and sophisticated, with families like Android.Phantom, Triada, RatOn, BRATA, and Joker exploiting everything from modified games and pirated versions of popular apps to compromised firmware and fake banking services. Understanding how they work, what symptoms they cause, and what security habits to implement daily is the best way to protect yourself. Continue using your mobile phone with peace of mind without becoming the next victim.

strategies to protect your devices
Related article:
Key strategies to protect your devices against digital risks