Fake ‘Antivirus’ App Spreads Android Malware, Steals Banking Credentials

If you think an app called “Antivirus” means your phone’s safe, think again. Cybercrooks just found a new way to turn that trust against you.
Researchers uncovered a malicious campaign spreading Android malware by disguising it as a legitimate antivirus tool… and hosting it right on a reputable AI platform. That means users could be lured into installing something that promises protection but delivers spyware instead.
How the fake antivirus app works
According to a report by Fox News, the ruse centers on an app called TrustBastion, which purports to be an Android security solution offering virus protection, phishing defense, and malware blocking. But it’s all a clever front.
Cybersecurity experts found this app hidden in public repositories on Hugging Face, a well-known developer hub for artificial intelligence and machine learning tools. The open nature of the platform — normally a boon for innovation — was exploited by attackers to host and spread malicious code. Because developers and researchers regularly share projects on the platform, the presence of downloadable files there may not immediately raise red flags for unsuspecting users.
Once users install the fake app, they’re hit with a scare tactic: a prompt claiming their phone is infected and urging them to “update” the app. That update doesn’t fix anything. Instead, it activates the malware payload, turning your phone into a gateway for spying and data theft.
In other words, the very action meant to “clean” your device is what actually compromises it.
From there, the malware can quietly take screenshots, steal your lock-screen PIN, and display fake login screens for banking services that mimic real ones. Any credentials you enter could be sent straight to the attackers. This is the classic “scareware” strategy at work — triggering urgency to trick you into giving the malware the permissions it needs.
Researchers say the malware’s ability to overlay convincing fake banking pages makes it especially dangerous, as victims may not realize their information has been intercepted until financial damage is done.
Why this threat matters and how to protect yourself
This kind of deception works because it preys on something everyone wants: security. An “antivirus” app coming from what looks like a trusted source can lower your guard. Add in visibility on an established developer platform, and the scam becomes even more convincing.
Here’s how to stay ahead of threats like TrustBastion:
- Stick to official app stores: Only download apps from Google Play or the Samsung Galaxy Store. These platforms have scanning and moderation that catch many malicious apps before they reach users.
- Scrutinize app details: Check reviews, download counts, and developer credentials before installing anything. Fake security apps often have sparse or suspicious feedback.
- Be wary of urgent pop-ups: Legitimate software rarely demands immediate updates or warns of infections with scare tactics. If it feels pushy or invasive, pause and verify.
- Enable built-in protections: Android devices include Google Play Protect, which can identify and block known malicious behavior even outside the Play Store. Keep it enabled and combine it with cautious habits.
Think of your phone like a digital castle: the gates are only as safe as the guards you hire. A shiny “antivirus” label isn’t enough to prove trustworthiness. In a world where malware hides in plain sight, healthy skepticism is one of your best defenses.
Also worth reading: Google warns that over 1 billion Android phones are now at risk because they no longer receive critical security updates, leaving users exposed to malware and spyware.
