HomeTechnology‘Godfather’ Android malware is back and its targeting banking apps: How it works and tips to stay safe

‘Godfather’ Android malware is back and its targeting banking apps: How it works and tips to stay safe

A new version of the Godfather Android malware uses virtualization to hijack banking apps, making it harder to detect while silently stealing credentials and executing unauthorised transactions in real time.

June 27, 2025 / 07:34 IST
Story continues below Advertisement
Godfather malware
Godfather malware

A dangerous new version of the Android malware known as Godfather is back and posing a significant threat to mobile banking users. This time, it uses advanced virtualisation techniques to stealthily hijack banking apps, steal login credentials, and manipulate transactions—all without raising any suspicion from the user or Android’s built-in protections.

How Godfather malware works?

Story continues below Advertisement

The latest variant of Godfather creates isolated virtual environments directly on the infected Android device. It uses open-source tools like VirtualApp and Xposed Framework to embed a virtualisation engine within the malicious APK itself. Once a user installs the malware, it scans the device for targeted apps, which include more than 500 banking, crypto, and e-commerce apps globally.

If a target is found, Godfather launches the genuine app inside a controlled container using a technique known as StubActivity. This allows the malware to present the real app interface to the user, maintaining visual authenticity while gaining full control over the session in the background.