Cerberus Anti-theft, a long-running Android security application available on Google Play, has been identified as operating as advanced stalkerware that enables extensive surveillance of victims’ devices. The app abuses Android accessibility services and Google Firebase to provide operators with near-total remote control over targeted smartphones. Once installed, the app allows attackers to send customized lock-screen notifications through the Cerberus web dashboard or a paired smartwatch. When victims interact with these notifications, the app can silently activate the device’s front camera and capture location data. It can also automatically trigger surveillance activities when the phone powers on or off, connects to new networks, enters geofenced locations, detects motion, or is unlocked, allowing continuous monitoring. Lock Screen Protector, a companion application developed by LSDroid SRL, requests Android accessibility permissions to monitor on-screen activity, capture screenshots, and block users from shutting down their devices. This secondary app helps reduce the visible permission footprint of Cerberus while expanding its surveillance capabilities. The malware supports 44 remote commands through Firebase Cloud Messaging, including silent photo capture, video/audio recording, GPS tracking, screen recording, SMS and call log access, device lock or wipe, and fake shutdown functionality. Despite violating Google Play policies, multiple Cerberus-related apps remain active on Google Play, raising concerns over privacy risks, regulatory scrutiny, and abuse of legitimate cloud infrastructure for command-and-control operations.
Cybercriminals are using a signed Logitech installer to distribute a new Brazilian banking trojan known as TCLBANKER. The malware mainly targets users in Brazil and monitors dozens...
A newly disclosed Linux kernel vulnerability named “Dirty Frag” has raised serious security concerns due to its ability to enable local privilege escalation (LPE) attacks on af...
Threat actors have successfully executed a sophisticated prompt injection attack targeting AI-powered Web3 agents, resulting in the unauthorized transfer of nearly $200,000 in cryp...