Cybersecurity experts are shedding light on a noteworthy transformation in the Android malware ecosystem, where dropper apps, traditionally linked to banking trojans, are now pivoting towards disseminating more straightforward malware, such as SMS stealers and elementary spyware. A recent report by ThreatFabric illustrates how these campaigns are being conducted through droppers masquerading as official government or banking applications within India and other Asian regions.
Impact of Google's Play Protect Program
The driving force behind this adaptation appears to be Google's Play Protect Pilot Program, operational in markets including Singapore, Thailand, Brazil, and India. This program aims to block side-loading of apps that necessitate risky permissions. Consequently, attackers have become more innovative, crafting droppers that do not immediately ask for high-risk permissions. Instead, these apps present users with a benign-looking update interface; only once a user engages with it does the dropper retrieve or unbundle the actual malicious payload and solicit permissions.
Even though Play Protect serves as a line of defense, ThreatFabric warns that risky applications can still find their way onto devices if users dismiss the installation warnings. Among the droppers under scrutiny, RewardDropMiner has been prominent, historically delivering spyware alongside a Monero cryptocurrency miner. However, recent iterations imply a shift, possibly omitting the mining functionality. Notable malicious applications spread through RewardDropMiner in India include PM YOJANA 2025, RTO Challan, SBI Online, and Axis Card.
Emerging Threats and Innovative Attacks
A multitude of other droppers have been identified, each reflecting a unique facet of the broader malware landscape. Names such as SecuriDropper, Zombinder, BrokewellDropper, HiddenCatDropper, and TiramisuDropper symbolize a range of threats exploiting the evolving technological environment.
Notwithstanding Google's assurances to The Hacker News about the absence of such techniques within Google Play, and the robustness of Play Protect's measures to safeguard users against the listed malware forms, vigilance remains imperative. Despite the layers of protection, cyber threat actors persistently explore avenues to outmaneuver defenses.
Adding to these concerns, Bitdefender Labs has issued alerts regarding a malvertising campaign circulating through Facebook Ads, where an imitation "premium" TradingView Android app is leveraged to deploy an enhanced banking trojan. Such ads, numbering at least 75 since late July 2025, have reached a significant European user base. This operation even extends to targeting Windows desktop systems, cloaked under the guise of legitimate financial and cryptocurrency applications.



