Particle.news

Download on the App Store

DoubleTrouble Banking Trojan Moves to Discord, Adds Real-Time Screen Recording and C2 Controls

Researchers warn it harnesses Discord channels to deliver disguised APKs, hijacks Android’s accessibility services to stay invisible, harvests banking, password manager, crypto-wallet credentials.

Image

Overview

  • The Trojan’s distribution has shifted from phishing websites to Discord-hosted APKs, enabling dynamic payload delivery through social media channels.
  • New features include real-time screen recording via MediaProjection APIs, fake lock screen overlays and advanced accessibility-based keylogging to capture sensitive input.
  • DoubleTrouble disguises itself with a Google Play icon and prompts users to enable Android’s accessibility services to evade detection and run stealthily in the background.
  • Attackers leverage a flexible command-and-control network to simulate taps and swipes, block apps, push phishing overlays and control system settings for targeted credential theft.
  • Active campaigns target European banking, password management and cryptocurrency wallet credentials, underscoring gaps in mobile security and the need for on-device protection and official app sourcing.