
Image by Vitaly Gariev, from Unsplash
New Malware Turns Real Banking Apps Into Spy Tools
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
Researchers warn that the GodFather banking malware has evolved, transforming trusted applications into tools for theft.
In a rush? Here are the quick facts:
- GodFather malware creates fake versions of real banking apps.
- It records every tap and keystroke in real-time.
- Uses virtualization to bypass visual detection and security.
Cybersecurity researchers at Zimperium zLabs discovered this advanced version of the malware, which uses virtualization to create deceptive copies of genuine applications, thus making user detection nearly impossible.
“This method marks a significant leap in mobile threat capabilities,” explained researchers Fernando Ortega and Vishnu Pratapagiri. Instead of simply showing a fake login screen like older malware, this version installs a host app that runs a virtual copy of your real banking or crypto app.
So when you open your banking app, you’re actually using a hijacked version that looks and behaves like the original, but every tap and password is being recorded.
The malware attacks applications from more than 500 companies, which include worldwide banks, crypto wallets, shopping, and messaging services. The malware specifically targets 12 Turkish banks, including Ziraat, Akbank, and ING Mobil. After installation, the malware can extract all user data, including PINs and passwords, together with messages and crypto wallet keys.
Worse still, it uses tricks to avoid detection. It manipulates Android ZIP files to fool security scans, hides malicious code in harmless-looking parts of the app, and abuses Android’s accessibility services to spy on users. “Ultimately, this virtualization technique erodes the fundamental trust between a user and their mobile applications,” researchers warned.
Infected devices under GodFather malware control allow hackers to perform device swipe actions, application taps, and screen lock password theft. The malware even sends fake pop-ups to users, which trick them into granting permissions without them realizing.
The researchers stress that mobile banking, and crypto users, need to download apps only from authorized sources while monitoring their applications for any abnormal behavior. Even a real app, they warn, might not be what it seems.

Image by Yosuke Ota, from Unsplash
40,000 Security Cameras Exposed: Hospitals, ATMs, and Baby Monitors at Risk
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
More than 40,000 security cameras around the world—including baby monitors, hospital cameras, and bird feeders—are exposed to the internet, putting private footage at risk of being viewed or misused by anyone online.
In a rush? Here are the quick facts:
- Over 40,000 cameras worldwide are exposed to the internet.
- Footage includes hospitals, ATMs, homes, and public transport systems.
- Many devices are accessible without hacking—default passwords remain unchanged.
More than 40,000 security cameras around the world—including baby monitors, hospital cameras, and bird feeders—are exposed to the internet, putting private footage at risk of being viewed or misused by anyone online, as first reported by 404 Media .
As explained in a new report from cybersecurity company BitSight, many of these devices can be accessed without any hacking skills at all. “It doesn’t take elite hacking to access these cameras,” the company said in a press release, as reported by 404 Media. “In most cases, a regular web browser and a curious mind are all it takes,” BitSight added.
BitSight researchers accessed footage from thousands of public and private systems, including ATMs, offices, and homes. In many cases, the data was also found shared and sold on the dark web.“
The most concerning examples found were cameras in hospitals or clinics monitoring patients,” said João Cruz, a lead researcher at BitSight, as reported by 404 Media. João added that “posing a significant privacy risk due to the highly sensitive nature of the footage.”
The risk goes beyond embarrassment—exposed cameras can help burglars plan break-ins, allow “shoulder surfing” to steal data, or even aid espionage, as noted by 404 Media.
One major reason for this vulnerability is the use of default logins, which are easily found online. BitSight didn’t use any brute-force attacks in its research, but Cruz believes the real number of exposed devices could be even higher, as reported by 404 Media.
Experts recommend users check devices, change factory-set passwords, and carefully read setup guides before connecting any camera to the internet. As Cruz warned, “Knowing the real number is practically impossible,” due to the huge variety of camera brands and models in circulation.