Site icon Cybercory

Hook Version 3 Emerges: Banking Trojan Gains Ransomware Overlays, NFC Tricks, Screen-Streaming – Enterprise Security at Risk

On 25 August 2025, Zimperium’s zLabs disclosed the release of Hook Version 3, an Android banking trojan now boasting advanced ransomware-style overlays, deceptive NFC prompts, lockscreen spoofing, transparent gesture capture, and live screen-streaming – raising the stakes for CISOs, SOC leads, and regulators everywhere

New Capabilities & Technical Arsenal

Hook Version 3 radically expands on prior functionality:

FeatureDescription
Ransomware-style overlaysFull-screen overlays delivering extortion messages with dynamic wallet and amount via C2 triggers
Fake NFC overlaysDeceptive overlays mimicking NFC scanning to lure victims into revealing data
Login spoof & lockscreen bypassFake PIN/pattern UI overlays to steal device credentials
Transparent gesture captureCaptures user gestures invisibly via overlay
Stealthy screen-streamingReal-time screen streaming to attacker-controlled endpoints

Total commands executed via Accessibility Services now number 107, including all previously known plus 38 new ones, enabling extensive device manipulation and data theft.

Distribution & Defensive Response

Expert Perspectives

“Hook Version 3 represents a convergence of ransomware, spyware, and banking malware, blurring threat boundaries and demanding elevated defensive postures,” said Fernando Ortega, Senior Security Researcher at Zimperium zLabs (SourceSecurity, Zimperium).
“Organizations must deploy real-time, on-device behavior-based security — especially when overlay-based and screen-streaming techniques are now being weaponized,” stressed Kern Smith, VP of Solutions Engineering at Zimperium (Security Journal UK, Zimperium).

MEA & Global Context

MITRE ATT&CK Mapping & IOCs (Optional)

No new MITRE ATT&CK mappings or IOCs were published in the source beyond the summary provided; thus they are not included to avoid inaccuracy.

Actionable Takeaways

  1. Enable on-device, behavior-based mobile defense (e.g., Zimperium’s MTD, zDefend) to counter overlay misuse and real-time screen capture.
  2. Block sideloading and restrict Accessibility Services, especially on enterprise-issued devices.
  3. Monitor GitHub and phishing channels for trojan distribution trends and promptly report takedown requests.
  4. Educate users and staff on dangers of unknown APKs, suspicious overlays, and requests to enter credentials.
  5. Deploy app-layer integrity checks and runtime protection SDKs to detect overlay injections.
  6. Conduct red-team exercises simulating overlay and screen-streaming attacks to evaluate defenses.
  7. Collaborate with regulators and industry peers for coordinated threat intelligence sharing and proactive messaging.
  8. Audit mobile device management (MDM) policies to prevent unauthorized app installations and enforce secure configurations.

Conclusion

Hook Version 3 elevates mobile banking threats with ransomware overlays, gesture capture, NFC deception, and live streaming-blending multiple attack paradigms into a single, potent threat. Enterprises, especially in finance and critical infrastructure, must adopt real-time, on-device defenses, limit high-risk permissions, and foster regional collaboration to stay ahead of this evolving danger. Future versions may only grow more advanced-preparedness is imperative.

Sources

Exit mobile version