A new Android malware, dubbed Perseus, is actively scanning user notes for sensitive information like passwords, recovery phrases, and financial data. Security researchers at ThreatFabric discovered this new threat. They say it represents a significant shift in mobile malware tactics.[bleepingcomputer+3]
Malware Targets Your Private Notes
Perseus is unique because it specifically targets popular note-taking applications on Android devices. This includes apps like Google Keep, Xiaomi Notes, Samsung Notes, ColorNote, Evernote, Microsoft OneNote, and Simple Notes.Researchers note this is the first time they have seen Android malware directly checking for sensitive details within personal notes.[bleepingcomputer+5]
The malware uses Android's Accessibility Services to operate. It systematically opens each note-taking app and scans the individual notes stored inside.This allows attackers to capture and record the contents of these notes without the user's direct involvement.Notes often hold highly valuable data such as login credentials, PINs, cryptocurrency recovery phrases, and other private thoughts.[bleepingcomputer+6]
How Perseus Spreads
Attackers distribute Perseus by disguising it as IPTV (Internet Protocol Television) streaming applications.These malicious apps are typically found outside the official Google Play Store, on unofficial marketplaces.Users often sideload these apps, meaning they install them manually from untrusted sources.This practice makes users more vulnerable to security risks, as they might bypass security warnings.[bleepingcomputer+8]
Once installed, Perseus gains extensive control over the infected device. It can perform a complete device takeover, capture screenshots, and launch overlay attacks.Overlay attacks involve placing fake login screens over legitimate apps to trick users into entering their credentials.The malware also conducts anti-analysis checks to evade detection, sending a "suspicion score" to its command-and-control panel before proceeding with data theft.[bleepingcomputer+6]
Evolution of Mobile Threats
Perseus builds on the code of older Android malware families. It evolved from the Phoenix codebase, which itself originated from the Cerberus code leaked nearly six years ago.This shows how mobile malware constantly adapts, incorporating new techniques and leveraging legitimate system features to remain effective.ThreatFabric's report highlights this continuous evolution in the mobile threat landscape.[bleepingcomputer+7]
The malware has two versions, according to ThreatFabric researchers. One version is in Turkish, and a more advanced English version includes better debugging features.While Perseus has global capabilities, it primarily targets users in Turkey and Italy.This focus on specific regions is common for many sophisticated mobile threats.[bleepingcomputer+2]
Protecting Your Android Device
Users can take several steps to protect their Android devices from Perseus and similar threats. The most important recommendation is to avoid sideloading applications from questionable sources.Always download apps only from the official Google Play Store.Google Play has security measures in place, although some malicious apps can occasionally slip through.[bleepingcomputer+2]
It is also crucial to ensure that Google Play Protect is active on your device. Regularly scan your device for known threats using Play Protect.Users should also be cautious about the permissions they grant to apps, especially Accessibility Services, which malware often abuses.Android 16 introduced a new `accessibilityDataSensitive` flag to help developers protect sensitive data within their apps from such exploitation.[bleepingcomputer+3]
By staying vigilant and following best security practices, Android users can reduce their risk of falling victim to evolving malware like Perseus.



