Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans

Cybersecurity experts have noticed a notable shift in Android malware campaigns, where dropper apps—traditionally used to deliver banking trojans—are now distributing simpler malicious software such as SMS stealers and lightweight spyware.

According to a report by ThreatFabric last week, these campaigns often impersonate government or banking apps in India and other Asian countries.

The Dutch mobile security company explained that this change is largely driven by new security measures Google is testing in countries like Singapore, Thailand, Brazil, and India. These measures prevent sideloading of apps requesting risky permissions, including SMS access and accessibility services, which are frequently abused for malicious activity on Android devices.

“Google Play Protect’s defenses, especially through targeted pilot programs, are becoming increasingly effective at blocking unsafe apps before they run,” the report stated. “Additionally, attackers are adapting to secure their operations for the future.”

ThreatFabric noted that wrapping even simple malware inside a dropper gives attackers a protective shell that can bypass current detection systems while allowing them to swap payloads and modify campaigns in the future.

To evade Google’s Pilot Program, some droppers are designed to initially request only harmless permissions and display a fake “update” screen that passes security scans in targeted regions. The actual malicious payload is downloaded or unpacked only after the user clicks the “Update” button, at which point the app seeks the necessary permissions to perform its malicious actions.

“Play Protect may warn users about risks during scans, but if users accept them, the app installs and delivers the malware,” ThreatFabric said. “This highlights a key gap: risky apps can still pass through if the user clicks Install, even under the Pilot Program.”

One example, RewardDropMiner, has historically delivered spyware and a remotely activated Monero cryptocurrency miner, although recent versions have removed the mining functionality.

Malicious app permissions blocked notification

Some malicious apps distributed by RewardDropMiner targeting Indian users include:

  • PM YOJANA 2025 (com.fluvdp.hrzmkgi)
  • RTO Challan (com.epr.fnroyex)
  • SBI Online (com.qmwownic.eqmff)
  • Axis Card (com.tolqppj.yqmrlytfzrxa)

Other droppers avoiding Play Protect detection include SecuriDropper, Zombinder, BrokewellDropper, HiddenCatDropper, and TiramisuDropper.

When contacted, Google confirmed to The Hacker News that none of these malware techniques have been detected on the Play Store, and Play Protect continues to automatically scan apps for threats.

Meanwhile, Bitdefender Labs warned of a related campaign that uses malicious Facebook ads promoting a free premium version of the TradingView app. This campaign distributes an advanced version of the Brokewell banking trojan, enabling attackers to monitor and steal sensitive data from Android devices.

Since July 22, 2025, over 75 malicious ads have targeted tens of thousands of users across the European Union. The campaign also affects Windows desktops through the same malvertising strategy, posing as financial or cryptocurrency apps.

Promotional ads for TradeViews service

“This campaign demonstrates how cybercriminals adjust their techniques to align with user habits,” Bitdefender noted. “By targeting mobile users and disguising malware as trusted trading tools, attackers aim to exploit the increasing popularity of crypto and financial applications.”

Indicators of Compromise (IOCs)

TypeIndicatorDescription
Android Package Namecom.fluvdp.hrzmkgiPM YOJANA 2025 dropper targeting Indian users
Android Package Namecom.epr.fnroyexRTO Challan dropper
Android Package Namecom.qmwownic.eqmffSBI Online dropper
Android Package Namecom.tolqppj.yqmrlytfzrxaAxis Card dropper
Malware FamiliesRewardDropMinerDropper delivering spyware, previously included Monero miner
Malware FamiliesSecuriDropperDropper variant evading Play Protect
Malware FamiliesZombinderDropper variant evading Play Protect
Malware FamiliesBrokewellDropperDropper variant evading Play Protect
Malware FamiliesHiddenCatDropperDropper variant evading Play Protect
Malware FamiliesTiramisuDropperDropper variant evading Play Protect
Network / PayloadRemote server URLsExternal servers used to download actual payload after user interaction
CampaignFacebook MalvertisingDelivery of Brokewell trojan via fake TradingView app ads
Affected RegionIndia, EUTargeted regions for mobile malware campaigns