Seniors targeted in global Facebook scam spreading new Android malware

Researchers have uncovered a scam campaign that uses Facebook groups promoting social activities for seniors to trick victims into installing Android malware on their devices.

The scheme first surfaced in Australia in August, when users reported suspicious groups advertising dance events, day trips and community gatherings for older people. Researchers at Dutch cybersecurity firm ThreatFabric later identified dozens of similar groups across Facebook, many relying on AI-generated content to lure victims into downloading malicious apps.

Since then, such operations have been spotted in Singapore, Malaysia, Canada, South Africa and the U.K. In a report on Tuesday, ThreatFabric warned that the malware at the center of the campaign — dubbed Datzbro — poses a global risk after its builder and command-and-control software leaked online, making it freely available to criminals worldwide.

“By focusing on seniors, fraudsters exploit trust and community-oriented activities to lure victims into installing malware,” the report said. “What begins as seemingly harmless event promotion on Facebook can escalate into device takeover, credential theft, and financial fraud.”

Although the groups were largely filled with AI-generated posts, the content appeared convincing enough to draw hundreds of responses. Once victims showed interest, fraudsters moved conversations to Messenger or WhatsApp, where they shared links to fake registration websites.

These sites encouraged users to download a “community app” to sign up and track activities. In reality, clicking the “Google Play” button triggered the installation of Datzbro — either directly or via a known Android dropper called Zombinder, which can bypass security protections on newer devices.

ThreatFabric said Datzbro combines spyware capabilities such as audio recording, camera access and file theft with banking trojan features, including remote access, keylogging and phishing aimed at stealing banking and cryptocurrency credentials.

For example, the malware can capture passwords for services like Alipay, China’s largest mobile payments platform and WeChat, the country’s dominant messaging and social app, as well as device PIN codes.

Although the campaign has not been attributed to a specific group, the command-and-control interface and much of the malware’s code contained Chinese-language strings, suggesting its developers are based in China, according to the report. Researchers also noted earlier campaigns targeting Chinese-speaking users, indicating Datzbro may have been deployed domestically before spreading globally.

“With its spyware functionality, remote access tools, and growing focus on banking apps, Datzbro represents a significant step in the blending of spyware and banking trojan capabilities,” the researchers wrote.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

Next Post

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

Related Posts

Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security

In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple's equipment AirDrop, allowing users to more easily share files and photos between Android and iPhone devices. The cross-platform sharing feature is currently limited to the Pixel 10 lineup and works with iPhone, iPad, and macOS devices, with plans to expand
Read More

U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

The U.S. Justice Department (DoJ) on Monday announced the seizure of a web domain and database that it said was used to further a criminal scheme designed to target and defraud Americans by means of bank account takeover fraud. The domain in question, web3adspanels[.]org, was used as a backend web panel to host and manipulate illegally harvested bank login credentials. Users to the website are
Read More

The Case for Dynamic AI-SaaS Security as Copilots Scale

Within the past year, artificial intelligence copilots and agents have quietly permeated the SaaS applications businesses use every day. Tools like Zoom, Slack, Microsoft 365, Salesforce, and ServiceNow now come with built-in AI assistants or agent-like features. Virtually every major SaaS vendor has rushed to embed AI into their offerings. The result is an explosion of AI capabilities across
Read More