Blog

Android malware uses VNC to give attackers hands-on access

A new Android banking and remote access trojan (RAT) dubbed Klopatra disguised as an IPTV and VPN app has infected more than 3,000 devices across Europe.

Klopatra is described as a powerful trojan that can monitor the screen in real time, capture input, simulate gesture navigation, and features a hidden Virtual Network Computing (VNC) mode.

Researchers at cybersecurity company Cleafy say that the new trojan does not appear to be connected to any documented Android malware families and appears to be the project of a Turkish-speaking cybercrime group.

Klopatra was developed to steal banking credentials via overlay attacks, exfiltrate clipboard content and keystrokes, drain accounts over VNC, and collect cryptocurrency wallet app info.

A stealthy, evasive threat

The malware infiltrates victims’ devices through a dropper app called “Modpro IP TV + VPN,” which is distributed outside of the official Google Play platform for Android.

The Klopatra installation process
The Klopatra installation process
Source: Cleafy Labs

Klopatra integrates Virbox, a commercial-grade code protector that obstructs reverse-engineering and analysis, uses native libraries to reduce its Java/Kotlin footprint, and also NP Manager string encryption in recent builds.

Cleafy reports that the malware features several anti-debugging mechanisms, runtime integrity checks, and emulator detection capabilities, to ensure it’s not running in an analysis environment.

Klopatra abuses Android’s Accessibility service to grant itself additional permissions, capture user inputs, simulate taps and gestures, and monitor the victim’s screen for passwords and other sensitive information.

Prompt to give Accessibility permission
Prompt to give Accessibility permission
Source: Cleafy Labs

One key feature is a black-screen VNC mode that allows operators to perform actions on the infected device while it appears idle (with a locked screen) to the victim.

This mode supports all the required remote actions for performing manual bank transactions, like simulating taps on defined screen coordinates, swiping up/down, and long-pressing.

See also  APT36 hackers abuse Linux .desktop files to install malware in new attacks

The malware checks if the device is charging or if the screen is off to determine the ideal moment to activate this mode without the user realizing it.

Commands sent by the operators to Klopatra
Commands sent by the operators to Klopatra
Source: Cleafy Labs

To avoid detection, Klopatra also contains a hardcoded list of package names corresponding to popular Android antivirus products, and attempts to uninstall them.

Hardcoded list of AV products the malware attempts to disable
Hardcoded list of AV products the malware attempts to disable
Source: Cleafy Labs

Operator exposure

Based on language artifacts and notes about development and monetization, Cleafy researchers believe that Klopatra is operated by a Turkish threat actor.

The researchers exposed multiple command and control (C2) points that appear connected to two campaigns, which count 3,000 unique infections.

Daily Klopatra infections
Daily Klopatra infections
Source: Cleafy Labs

Although the operators of the malware use Cloudflare to hide their digital tracks, a misconfiguration exposed origin IP addresses, which allowed linking the C2 servers to the same provider.

Since March 2025, when Klopatra first appeared in the wild, there have been 40 distinct builds, a sign of active development and quick evolution for the new Android trojan.

Android users are advised to avoid downloading APK files from obscure websites, reject Accessibility Service permission requests, and keep Play Protect active on their device.

Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation.

Don’t miss the event that will shape the future of your security strategy


Source link

Back to top button
close