Dr.Net Safety House for cellular gadgets reported that malware exercise on Android gadgets elevated considerably within the second quarter of 2025.
Adware trojans, significantly from the Android.HiddenAds household, remained probably the most prevalent risk, regardless of an 8.62% lower in consumer encounters.
These trojans typically disguise themselves as innocent apps or disguise inside system directories, concealing their presence by eradicating icons from the house display screen.
Intently following, Android.MobiDash adware trojans noticed an 11.17% improve in assault frequency, embedding intrusive ad-displaying modules into functions.
In the meantime, Android.FakeApp malicious packages, typically utilized in fraudulent schemes like loading on-line on line casino websites, ranked third, although their detection dropped by 25.17%.
A big concern was the sharp 73.15% rise in Android.Banker banking trojan exercise in comparison with the earlier quarter, highlighting a rising danger to customers’ monetary safety.
Nonetheless, different banking trojan households, similar to Android.BankBot and Android.SpyMax, noticed declines of 37.19% and 19.14%, respectively, indicating a shift in malicious focus.
Cryptocurrency Theft
April marked the emergence of extremely refined threats concentrating on particular consumer teams.
Dr.Net analysts uncovered a large-scale cryptocurrency theft marketing campaign involving Android.Clipper.31, a trojan embedded in modified WhatsApp variations and pre-installed within the firmware of sure price range Android smartphones.
This malware intercepts messages within the messenger app, swaps respectable Tron and Ethereum crypto pockets addresses with fraudulent ones, and disguises the substitution to deceive customers.
Moreover, it uploads photos in jpg, png, and jpeg codecs to distant servers to extract mnemonic phrases for victims’ wallets, posing a extreme danger to cryptocurrency holders.
Concurrently, a spy ware marketing campaign focused Russian army personnel by Android.Spy.1292.origin, hidden in a modified Alpine Quest mapping app and distributed by way of faux Telegram channels and app catalogs.
This trojan exfiltrates delicate information, together with consumer accounts, contacts, geolocation, and information, with a selected give attention to confidential paperwork and site logs from messengers, demonstrating the strategic intent behind such assaults.
Google Play Threats
The proliferation of threats on Google Play continued to escalate, with Dr.Net detecting dozens of malicious apps, together with Android.FakeApp variants posing as monetary instruments and video games.

Examples embody Android.FakeApp.1863, disguised as “TPAO” concentrating on Turkish customers, and Android.FakeApp.1859, marketed as “Quantum MindPro” for French-speaking audiences, each loading fraudulent web sites.
Faux video games like “Pino Bounce” (Android.FakeApp.1840) redirected customers to on-line casinos, whereas adware like Adware.Adpush.21912, hidden in “Coin Information Promax,” displayed misleading notifications resulting in malicious hyperlinks.
These incidents underscore the persistent problem of securing official app shops. Dr.Net additionally recognized varied undesirable software program, similar to Program.FakeMoney.11, which lures customers with false guarantees of earnings, and riskware instruments like Instrument.SilentInstaller.14.origin, able to launching APK information with out set up.
To safeguard Android gadgets, specialists strongly advocate deploying strong anti-virus options like Dr.Net for Android, emphasizing proactive safety in opposition to this evolving risk panorama.
As cybercriminals refine their ways, consumer vigilance and superior safety measures stay crucial to mitigating dangers.
Unique Webinar Alert: Harnessing Intel® Processor Improvements for Superior API Safety – Register for Free