Close Menu
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
X (Twitter) LinkedIn WhatsApp
Trending
  • Pentest ai agents: How 28 Subagents Turn AI Into a Real Pentest
  • Cybersecurity Weekly Report : April 19 – 26, 2026
  • Cybersecurity Weekly Report (April 06–12, 2026): Ransomware & Major Attacks
  • Cybersecurity Weekly Report: March 23 – 29, 2026
  • Data Breach Detection Time 2026: The Full Guide
  • Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode
  • Cybersecurity Weekly Report: 16 – 22 March, 2026
  • CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
Tuesday, May 5
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
Cyber infos
Mobile Security

Android Users Alert: BingoMod Trojan Drains Money and Erases Data

V DiwaharBy V DiwaharAugust 3, 2024Updated:March 24, 2026No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link

Security analysts have recently detected a new Android trojan dubbed BingoMod.

This is a very dangerous malware and it is currently causing significant harm in ways such that not only is it embezzling money but also erasing devices to prevent itself from being detected.

Table of Contents hide
1 Discovery of BingoMod
2 Capabilities of BingoMod
3 Self-Destruct Mechanism
4 Implications and Protective Measures

Discovery of BingoMod

The application, called BingMod was found by researchers from the Italian cybersecurity firm Cleafy at the end of May 2024. It is still being updated, and the first versions of the malware’s source code contain comments in the Romanian language, so it was presumably created by a Romanian-speaking hacker.

Capabilities of BingoMod

BingoMod is among the latest generation of mobile malware with enhanced remote access features. This leaves the attackers with an opportunity to hijack accounts from the compromised gadgets by employing the on-device fraud (ODF) method.

It had been used in other trojans such as Medusa, Copybara, and TeaBot, and it is evident that it will continue to spread as the hackers find new ways of using.Read this blog to know Antivirus Your Silent Cyber Guardian 10 Ways it Protects You

Self-Destruct Mechanism

BingoMod infected some apps that claim to be an antivirus tool or an update of Google Chrome. They lure users into providing accessibility permission which is used by the trojan to run its payload, lock the user, and get the device information.

Android Users Alert: BingoMod Trojan Drains Money and Erases Data
Image credits: cleafy.com

Smishing and Accessibility Abuse

After the app is installed, it exploits the apps accessibility services API and captures information displayed on the screen and intercepts text messages. This data is then sent to an attacker controlled server.

Remote Money Transfers

The ODF technique involves the use of an operator who can conduct money transfers of up to 15000 Euros ($16100) per transaction. It is different from automatic systems which conduct frauds in large scale financial crimes.

Evading Detection

Except for the real-time screen control, BingoMod employs phishing capabilities through Overlay Attacks and fake notifications. Notably, these attacks are not driven by opening specific apps, but by the malware operator themselves.

[Also read: The 15 Most Common Types of Malware: Protect Your System from Digital Threats]

Implications and Protective Measures

  • This means that such dangerous malware can be avoided through proper use of reliable antivirus and knowledge of the latest threats.
  • Staying vigilant and practicing safe online habits are crucial in defending against such cyber threats.
  • Cybersecurity researchers have sounded the alarm on a newly discovered Android trojan named BingoMod.
  • This dangerous malware is causing severe damage by not only stealing money but also wiping devices to hide its tracks.

Related posts:

  1. How to Spot a Fake Website: 10 Warning Signs You Need to Know
  2. Top 15 Mobile Security Tips to Protect Your Phone
  3. Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions
  4. A checklist for securing your online accounts
malware
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleTop Cybersecurity Risk Management Practices: Building a Resilient Defense System
Next Article 8 Strategy to Protect Your Business from Supply Chain Attacks in 2026
V Diwahar
  • Website
  • LinkedIn

I'm Aspiring SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

Related Posts

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026
Read More

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026
Read More

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber Attacks & Exploits

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026

AI-Powered Cyber Attacks Surge 89% in 2025 Crisis Breakouts

February 25, 2026

Google Antigravity Suspension Hits OpenClaw Users

February 24, 2026
Top 10 Security Tools

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

Top 10 Best Dynamic Malware Analysis Tools in 2026

March 6, 2025

Mobile Security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Pentest ai agents: How 28 Subagents Turn AI Into a Real Pentest

April 30, 2026

Cybersecurity Weekly Report : April 19 – 26, 2026

April 27, 2026

Cybersecurity Weekly Report (April 06–12, 2026): Ransomware & Major Attacks

April 13, 2026

Cybersecurity Weekly Report: March 23 – 29, 2026

March 30, 2026

Data Breach Detection Time 2026: The Full Guide

March 28, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

CyberInfos delivers trusted cybersecurity news, expert threat analysis, and digital safety guidance for individuals and businesses worldwide.

LinkedIn
Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemap
Copyright © 2026 cyberinfos.in - All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.