#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

33 C
Dubai
Thursday, September 11, 2025
HomeTopics 1Banking & CybersecurityHook Version 3 Emerges: Banking Trojan Gains Ransomware Overlays, NFC Tricks, Screen-Streaming...

Hook Version 3 Emerges: Banking Trojan Gains Ransomware Overlays, NFC Tricks, Screen-Streaming – Enterprise Security at Risk

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

On 25 August 2025, Zimperium’s zLabs disclosed the release of Hook Version 3, an Android banking trojan now boasting advanced ransomware-style overlays, deceptive NFC prompts, lockscreen spoofing, transparent gesture capture, and live screen-streaming – raising the stakes for CISOs, SOC leads, and regulators everywhere

  • On 25 August 2025, Zimperium’s zLabs published its findings on Hook Version 3, detailing its newly added capabilities and expanded command set.
  • Hook is a banking trojan rooted in the ERMAC malware lineage, originally surfaced in earlier versions and developed as an evolution with over 38 additional remote commands compared to ERMAC.
  • This latest variant introduces 107 remote commands, including ransomware overlays, fake NFC overlays, deceptive PIN/pattern lockscreens, transparent gesture capturing, and stealthy screen-streaming-marking it among the most sophisticated Android banking trojans to date.

New Capabilities & Technical Arsenal

Hook Version 3 radically expands on prior functionality:

FeatureDescription
Ransomware-style overlaysFull-screen overlays delivering extortion messages with dynamic wallet and amount via C2 triggers
Fake NFC overlaysDeceptive overlays mimicking NFC scanning to lure victims into revealing data
Login spoof & lockscreen bypassFake PIN/pattern UI overlays to steal device credentials
Transparent gesture captureCaptures user gestures invisibly via overlay
Stealthy screen-streamingReal-time screen streaming to attacker-controlled endpoints

Total commands executed via Accessibility Services now number 107, including all previously known plus 38 new ones, enabling extensive device manipulation and data theft.

Distribution & Defensive Response

  • Zimperium noted that the malware is likely being spread at scale via phishing websites and GitHub-hosted APKs, mirroring contemporary trends of abusing trusted platforms for distribution.
  • Zimperium’s Mobile Threat Defense (MTD) and zDefend solutions offer on-device detection-even for sideloaded threats-and have supported takedown actions against malicious GitHub repositories.

Expert Perspectives

“Hook Version 3 represents a convergence of ransomware, spyware, and banking malware, blurring threat boundaries and demanding elevated defensive postures,” said Fernando Ortega, Senior Security Researcher at Zimperium zLabs (SourceSecurity, Zimperium).
“Organizations must deploy real-time, on-device behavior-based security — especially when overlay-based and screen-streaming techniques are now being weaponized,” stressed Kern Smith, VP of Solutions Engineering at Zimperium (Security Journal UK, Zimperium).

MEA & Global Context

  • While no regional impact data for the Middle East and Africa (MEA) was confirmed, the trojan’s global rise underscores heightened risk for the region, particularly where mobile banking adoption is surging.
  • Regional policymakers and regulators may need to consider stricter app-store vetting and public-awareness campaigns to combat sideloaded and overlay-based threats.
  • Globally, banking malware is trending toward MaaS models, screen-sharing, real-time overlays, and social engineering via platforms like Discord or GitHub, as seen across families like DoubleTrouble and GodFather.

MITRE ATT&CK Mapping & IOCs (Optional)

No new MITRE ATT&CK mappings or IOCs were published in the source beyond the summary provided; thus they are not included to avoid inaccuracy.

Actionable Takeaways

  1. Enable on-device, behavior-based mobile defense (e.g., Zimperium’s MTD, zDefend) to counter overlay misuse and real-time screen capture.
  2. Block sideloading and restrict Accessibility Services, especially on enterprise-issued devices.
  3. Monitor GitHub and phishing channels for trojan distribution trends and promptly report takedown requests.
  4. Educate users and staff on dangers of unknown APKs, suspicious overlays, and requests to enter credentials.
  5. Deploy app-layer integrity checks and runtime protection SDKs to detect overlay injections.
  6. Conduct red-team exercises simulating overlay and screen-streaming attacks to evaluate defenses.
  7. Collaborate with regulators and industry peers for coordinated threat intelligence sharing and proactive messaging.
  8. Audit mobile device management (MDM) policies to prevent unauthorized app installations and enforce secure configurations.

Conclusion

Hook Version 3 elevates mobile banking threats with ransomware overlays, gesture capture, NFC deception, and live streaming-blending multiple attack paradigms into a single, potent threat. Enterprises, especially in finance and critical infrastructure, must adopt real-time, on-device defenses, limit high-risk permissions, and foster regional collaboration to stay ahead of this evolving danger. Future versions may only grow more advanced-preparedness is imperative.

Sources

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here