Hook Android Banking Malware Adds Advanced Features, Supports 107 Remote Commands

5g (1)

A newly discovered variant of the Hook Android banking trojan has surfaced with extraordinary capabilities, placing it among the most powerful mobile malware strains identified so far.

Evolution of Hook Trojan

The latest build, called Hook Version 3, marks a major advancement in Android malware technology. It introduces a massive toolkit of 107 remote commands, including 38 brand new features, merging the traits of banking trojans, ransomware, and spyware into one hybrid threat.

Distribution via GitHub

Unlike earlier versions that relied heavily on phishing websites, this new variant also spreads through GitHub repositories. Cybercriminals exploit the platform’s trustworthiness to host and distribute malicious APK files. This strategy makes victims more likely to download infected apps since they appear to come from a credible source.

Researchers also found GitHub being used to distribute other malware families such as Ermac and Brokewell, pointing to a growing malware-as-a-service ecosystem.

Key Advancements Identified by Analysts

Security experts at Zimperium highlighted several cutting-edge capabilities in Hook Version 3:

  • Ransomware-like overlays that demand cryptocurrency payments.
  • Fake NFC scanning screens designed for fraudulent use.
  • Lock screen bypass mechanisms enabling attackers to unlock devices remotely.

malware requesting accessibility services to the victim (source zimperium)
Malware requesting accessibility services from victim (Source – Zimperium)

At its core, the malware still abuses Android Accessibility Services. However, it now integrates transparent overlays to capture gestures secretly and supports real-time screen streaming, giving hackers near-total control over infected devices.

Overlay Attack Enhancements

The most striking improvement lies in Hook Version 3’s multi-layered overlay attacks that trick users and steal sensitive data.

  • Ransomware-style overlays: Full-screen warnings demanding cryptocurrency payments appear, with wallet addresses and amounts fetched dynamically from the attacker’s command-and-control (C2) servers.

screenshot
Ransomware style overlay (Source – Zimperium)

These overlays are powered by embedded HTML inside the APK, allowing instant deployment when the “ransome” command is triggered. Attackers can dismiss it remotely using the “delete_ransome” command.

  • Fake NFC overlays: Through the “takenfc” command, Hook displays fraudulent NFC scanning pages using fullscreen WebView overlays.

screenshot
Fake NFC overlay (Source – Zimperium)

Though not yet fully integrated with JavaScript for data theft, this feature signals ongoing development toward advanced NFC-based phishing attacks.

Lock Screen Bypass Threat

Perhaps the most alarming function is Hook’s ability to bypass device lock screens. Using the “unlock_pin” command, it:

  1. Gains WakeLock privileges
  2. Performs swipe-up gestures to display the lock screen
  3. Enters stolen PINs with simulated button presses

This process effectively breaks through Android’s primary defense, granting attackers unrestricted device access for further malicious operations.