'Massiv' Android Banking Malware Disguised as IPTV App Steals Banking Access and Identities


Massiv banking trojan targets Android users through fake IPTV apps. The malware overlays screens, logs keystrokes, and enables remote device control. ThreatFabric researchers identified campaigns hitting Portuguese government authentication apps connected to Chave Móvel Digital. Attackers use stolen data to bypass KYC checks and open fraudulent accounts.

Operators control victims through two methods. MediaProjection API streams live screens. Accessibility Service extracts UI trees with text, coordinates, and interaction data. This bypasses banking apps blocking screenshots. Fraudsters open new accounts in victim’s name, take loans, and leave debts behind.

IPTV lures exploded over eight months. Users expect pirated streams outside Google Play. Sideloading seems normal. Fake apps drop Massiv payload. Some load real IPTV sites via WebView to avoid suspicion. Spain, Portugal, France, and Turkey see heaviest attacks.

Attack Capabilities Table

FeatureTechniquePurpose
Screen OverlayWebView injectionCapture login credentials
KeyloggingAccessibility ServiceLog passwords, OTPs
Live StreamingMediaProjection APIReal-time operator control
UI Tree ExtractionAccessibility dumpBypass screenshot protection
Device AdminSilent activationPrevent uninstall

Full banking takeover enabled.

Target Applications

Massiv focuses on high-value apps:

  • Portuguese Chave Móvel Digital authentication.
  • Major EU/Spanish/Portuguese banks.
  • Government identity services.
  • KYC verification portals.

Stolen data fuels synthetic identity fraud.

Remote Control Modes

Operators choose between:

  • Screen Streaming: MediaProjection captures everything visually.
  • UI Automation: Accessibility Service reads structured data (text, buttons, fields).

UI mode defeats banking anti-malware protections perfectly.

IPTV Lure Trend

Fake IPTV APKs surged recently:

  • Copyright violations keep apps off Google Play.
  • Users accustomed to Telegram/Discord distribution.
  • WebView fakes maintain credibility.
  • Dropper installs Massiv silently.

Targets: Spain (40%), Portugal (25%), France (20%), Turkey (15%).

Infection Chain

  1. Lure: IPTV APK from Telegram/social media.
  2. Dropper: Fake app requests permissions.
  3. Payload: Massiv extracts from assets.
  4. Persistence: Accessibility + Device Admin.
  5. C2: Operator receives control panel access.

Victim sees working IPTV interface.

Immediate Protection Steps

Android users act now:

  • Disable unknown sources (Settings > Apps > Special Access).
  • Revoke Accessibility access for non-system apps.
  • Enable Google Play Protect scanning.
  • Avoid IPTV APKs from unofficial sources.
  • Monitor for overlay attacks during banking.

Only install from Google Play Store.

Detection Indicators

Warning signs of Massiv:

  • IPTV app requests Accessibility Service.
  • MediaProjection prompts from video apps.
  • Banking apps show overlay warnings.
  • Device Admin enabled for streaming apps.
  • High network to C2 domains.

Uninstall suspicious apps immediately.

Geographic Impact Map

CountryAttack SharePrimary Lures
Spain40%Football streams
Portugal25%Government apps
France20%Premium channels
Turkey15%Local sports

EU banking sector heavily targeted.

Enterprise Defenses

Organizations deploy MDM controls:

  • Block Accessibility Service for non-approved apps.
  • Disable MediaProjection API enterprise-wide.
  • Monitor for overlay permission abuse.
  • Whitelist banking apps only.
  • Regular Google Play Protect scans.

Employee education critical.

FAQ

What permissions does Massiv malware abuse?

Accessibility Service, MediaProjection API, Device Admin.

Which countries face Massiv IPTV attacks?

Spain, Portugal, France, Turkey primarily.

How does Massiv bypass banking screenshot blocks?

UI tree extraction via Accessibility Service.

Do victims notice Massiv during operation?

No. IPTV interface appears functional.

Where do Massiv IPTV droppers distribute?

Telegram, Discord, social media groups.

Does Google Play host Massiv malware?

No. Only sideloaded APKs observed.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages