Cyware Daily Threat Intelligence, September 30, 2025

shutterstock 2021698187 (1)

Daily Threat Briefing September 30, 2025

Elderly folks are being sweet-talked by AI-crafted Facebook travel scams into installing fake APKs, then Datzbro slips in, hijacks their Androids with accessibility abuse, keylogging, overlays and a creepily efficient remote-control mode to swipe credentials and drain accounts.

Another Android banking trojan  Klopatra, enables full remote device takeover and mass financial fraud, using Virbox obfuscation and native C/C++ libraries. It spreads via a streaming-app dropper that abuses Install Unknown Apps and Accessibility permissions, and installs a hidden VNC that can simulate a “black screen” for stealthy control.

CVE-2024-3400, a critical, publicly exploited 10.0 CVSS vulnerability in Palo Alto PAN-OS GlobalProtect (versions 10.2, 11.0, 11.1) allows for OS command injection and requires immediate application of vendor-released fixes and hotfixes.

Top Malware Reported in the Last 24 Hours

Datzbro trojan uses AI to trick elderly users

Cybersecurity researchers discovered a new Android banking trojan called Datzbro, targeting elderly users through AI-generated Facebook travel event scams. Victims are tricked into downloading malicious APK files via fraudulent links, leading to device takeover and financial fraud. The malware uses advanced techniques like Android accessibility services, keylogging, and overlay attacks to steal credentials and conduct transactions. Datzbro's remote control mode allows attackers to recreate the victim's device layout for effective exploitation.

New Android banking trojan uses hidden VNC for stealthy attacks

Klopatra, a new Android banking trojan is enabling full remote control of devices and large-scale financial fraud. It uses Virbox for advanced obfuscation and native C/C++ libraries to evade detection. Infection begins with a dropper disguised as a streaming app, exploiting "Install Unknown Apps" and Accessibility Services permissions. Hidden VNC allows attackers to operate devices stealthily, even simulating a "black screen" to avoid user suspicion. 

Top Vulnerabilities Reported in the Last 24 Hours

Broadcom patches critical VMware NSX flaws

Broadcom released updates to fix two high-severity VMware NSX vulnerabilities reported by the NSA, including password recovery and username enumeration flaws that could lead to unauthorized access. Broadcom patched a high-severity SMTP header injection vulnerability in VMware vCenter, along with other flaws in VMware Aria Operations and VMware Tools that could escalate privileges and compromise credentials. Earlier in 2025, Broadcom addressed zero-day vulnerabilities exploited during the Pwn2Own Berlin contest, as well as other actively exploited VMware zero-days reported by Microsoft.

Hackers exploit a critical bug in Palo Alto GlobalProtect

Hackers are probing systems for CVE-2024-3400, a critical vulnerability in Palo Alto PAN-OS GlobalProtect, enabling file creation and possible OS command injection. The vulnerability affects PAN-OS versions 10.2, 11.0, and 11.1 configured with GlobalProtect, but not Cloud NGFW, Panorama, or Prisma Access. A CVSS score of 10.0 and public proof-of-concept code heighten the urgency for patching and mitigation. Palo Alto Networks has released fixes and hotfixes for affected versions, along with threat prevention signatures to block exploit attempts.

Apple addresses critical Font Parser vulnerability

Apple has issued a security update for macOS Sequoia 15.7.1 to address a critical vulnerability in its font parser (CVE-2025-43400). The flaw, which involves an out-of-bounds write, could lead to application crashes or memory corruption if exploited via malicious font files. While no active exploitation has been reported, the vulnerability might enable remote code execution when combined with other bugs. Apple advises users to promptly install the update, which also applies to iOS, iPadOS, visionOS, and earlier macOS versions.

Related Threat Briefings