Malware Timeline 2019

Anish · January 18, 2019

Popular malware seen in 2019, I have uploaded APK files for all the entries that I could on my Github repository

January:

  • Zazdi Botnet - Spyware that spreads via Facebook profiles and Youtube descriptions
  • Anubis dropper - This dropper comes with motion detection capabilities
  • Masquerading malware - This malware disguises as TV remote and other apps

  • February:

  • Crypto Clipper - Switches crypto wallet data
  • UFO cryptominer - Another cryptominer
  • Malbus - Legit app started dropping malware after 5 years
  • Farseer

  • March:

  • Operation Sheep - Harvesting user data
  • SimBad - Rogue Adware campaign
  • Apex Legends Spyware - Spyware masquerades as Apex Legends
  • UC Browser vulnerability - Allows an attacker to spread malware using this vulnerability
  • Adware in Gretel A7 - Pre-installed malware in Gretel phones
  • Adware in beauty apps - Adware ridden beauty apps
  • A comparative study of Mobile Anti-virus solutions
  • Fake banking apps
  • Brazilian Android RAT
  • Fraud Financial Apps
  • Persistent malware - Just removes icon instead of the whole app
  • Comebot
  • Gustuff- Crypto Trojan
  • Exodus- A two stage spyware Another link

  • April:

  • Xloader - New version of this threat
  • Gustuff targets Australia - Another instance of Gustuff attack
  • Malware that sends WhatsApp messages
  • Crypto banking Ransomware
  • Sauron Locker
  • StealJob - State sponsored malware
  • Gretel pre-installed malware
  • DrWeb Infection Ads
  • Jio Offers - Spreads via messages like a Worm
  • Adware TsSDK - An aggressive adware component
  • Anubis strikes again - With new downloaders Another link
  • Preamo - An adware clicker campaign

  • May:

  • Fake Trezor crypto apps - Steals Crypto wallets
  • Vidmate - Generates fake clicks and installs apps
  • Anubis - Using Telegram and Chinese charactes to contact attackers
  • MysteryBot - New test sample
  • Aggressive adware
  • Banker with SMS permissions - Targetting Spanish Banks


  • June:

  • HiddenApps- Adware on GooglePlay
  • Fraudelent push notifications
  • Subscription based fraud
  • 2FA Bypass/Stealer
  • Trojan downloader- Found on GooglePlay
  • Triada- Pre-installed malware
  • Beita adwareplugin
  • Anubis Dropper
  • Bouncing golf - Targets MiddleEast
  • Cryptomining botnet - Spreads through SSH
  • Riltok banker - A mobile banker with global reach
  • ViceLeaker Operation - Mobile espionage campaign
  • WannaLocker, Additional link
  • BankBot
  • Horror game trojan- Phishing for Google and Facebook credentials

  • July:

  • New Anubis Dropper
  • Operation Tripoli
  • Agent Smith
  • Slocker ransomware mimicking Wannacry
  • Stalker apps on GPlay
  • FinSpy
  • Icon-hiding malware, Link 2, Link 3
  • Un-official Telegram
  • Advertisement framework - Samsung updates
  • Adware Dropper
  • Monokle
  • Android Ransomware
  • FaceApp Scams

  • August:

  • Adware in Photography apps
  • Clicker Trojan
  • Ahmyth Spyware
  • Cerberus
  • Malware downloader in Camscanner
  • Ares IOT Botnet

  • September:

  • Stalkerware app
  • Trojan dropper
  • Selfie Adware
  • Joker
  • FunkyBot
  • Fake creditcard stealer
  • Hidden adware
  • Whistleblower phishing Spyware
  • Fleeceware apps overcharging
  • Fake Apps
  • Malware impersonates Korean National police
  • Spyware targeting Tibetan citizens
  • Malicious photo adware
  • 2FA bypass
  • Adware droppers
  • Hiddad
  • Hydra

  • October:

  • Xhelper
  • More Joker trojans
  • Ginp link 2
  • Adware dropper - Triggers after reboot link 2
  • Beauty apps capture notifications
  • HiddenApp
  • Fake bluewin app phishes
  • Geost
  • Icon Hiding
  • New Gustuff variant
  • Malicious camera apps

  • November:

  • Stalkerware
  • HiddenAd
  • Dropper
  • Evasive malware
  • Test message spy
  • AdBlocker malware

  • December:

  • CallerSpy Cyberespionage
  • ThanksGiving malware
  • Venus malware
  • CoyBolt
  • Soraka SDK
  • Twitter, Facebook