BTCC / BTCC Square / M1n3rX /
New Android RAT "Fantasy Hub" Sold as Malware-as-a-Service on Russian Telegram Channels – A Growing Threat in 2025

New Android RAT "Fantasy Hub" Sold as Malware-as-a-Service on Russian Telegram Channels – A Growing Threat in 2025

Author:
M1n3rX
Published:
2025-11-12 13:13:02
7
1


In the ever-evolving landscape of cyber threats, a new Android Remote Access Trojan (RAT) dubbed "Fantasy Hub" has emerged as a dangerous Malware-as-a-Service (MaaS) offering on Russian Telegram channels. This sophisticated spyware disguises itself as a Google Play Store update, hijacks SMS for two-factor authentication theft, and even streams live camera and microphone feeds via WebRTC. With subscription plans ranging from $200/week to $4,500/year, this turnkey cybercrime solution is empowering even technically limited attackers to target mobile banking users globally. The malware's advanced capabilities and Russian banking-specific targeting make it particularly concerning as we approach the end of 2025.

What Makes Fantasy Hub Such a Dangerous Threat?

Fantasy Hub represents the next evolution in mobile malware, combining multiple attack vectors into a single, user-friendly package. Unlike traditional malware that requires technical expertise to deploy, this MaaS model provides criminals with a ready-made cyberweapon. The malware transforms any app into spyware, bypasses security measures by posing as a Play Store update, and even teaches criminals how to create fake Google Play Store landing pages. According to security researchers, what sets Fantasy Hub apart is its native integration of WebRTC live streaming - allowing real-time surveillance of compromised devices.

Fantasy Hub hacking method

Source: Hackers Hub

How Does Fantasy Hub Compromise Android Devices?

The malware employs several clever techniques to gain extensive device control. First, it tricks users into setting it as the default SMS manager, granting it sweeping permissions without individual requests. Once installed, it can:

  • Intercept and delete incoming SMS messages (including 2FA codes)
  • Access contacts, call history, photos, and videos
  • Remotely control the camera and microphone
  • Inject malicious code into legitimate APK files

As noted by Vishnu Pratapagiri from Zimperium, "This spyware poses a direct threat to businesses using BYOD policies, especially those with employees accessing mobile banking." The malware's ability to create convincing fake interfaces for Russian banks like Alfa, PSB, T-Bank, and Sberbank makes it particularly effective at stealing financial credentials.

The Business Model Behind the Malware

Fantasy Hub operates on a subscription basis through automated Telegram bots, with tiered pricing:

PlanPrice
Weekly$200
Monthly$500
Annual$4,500

The malware's control panel provides attackers with detailed information about compromised devices and subscription status. Interestingly, the service includes tutorials on creating fake Google Play Store pages and bypassing security restrictions - essentially offering cybercrime education alongside the malware itself.

The Broader Context of Android Banking Malware

Fantasy Hub isn't operating in isolation. Recent reports from Zscaler ThreatLabz reveal a 67% annual increase in Android malware transactions, with sophisticated banking Trojans like Anatsa, ERMAC, and TrickMo also active. These malware families often disguise themselves as legitimate utility apps on both official and third-party platforms. Once installed, they employ increasingly sophisticated methods to steal login credentials and bypass two-factor authentication.

Meanwhile, CERT Polska has warned about new Android malware called NGate targeting Polish bank customers through NFC relay attacks. These developments suggest we're seeing a global escalation in mobile financial threats as we MOVE through 2025.

Protecting Against Fantasy Hub and Similar Threats

Given the sophistication of these attacks, basic security measures may not be enough. The BTCC research team recommends:

  1. Never install apps from unofficial sources
  2. Be extremely cautious when asked to change default app settings
  3. Regularly review app permissions and revoke unnecessary access
  4. Use hardware security keys instead of SMS-based 2FA where possible
  5. Keep devices updated with the latest security patches

As one security professional joked darkly, "The only fantasy here is thinking your mobile banking is safe." While said in jest, it underscores the serious nature of these evolving threats.

FAQ: Fantasy Hub Android Malware

What is Fantasy Hub?

Fantasy Hub is a sophisticated Android Remote Access Trojan (RAT) being sold as Malware-as-a-Service on Russian Telegram channels. It can spy on devices, steal banking credentials, and even stream live camera feeds.

How does Fantasy Hub infect devices?

It typically disguises itself as a Google Play Store update, tricks users into making it the default SMS app, and then gains extensive permissions to access sensitive data.

Which banks are being targeted?

The malware currently focuses on Russian banks including Alfa, PSB, T-Bank, and Sberbank, creating fake interfaces to steal login credentials.

How much does Fantasy Hub cost?

The malware is offered through subscription plans ranging from $200 per week to $4,500 for an annual license.

What makes Fantasy Hub particularly dangerous?

Its combination of multiple attack vectors (SMS interception, live streaming, banking trojan capabilities) packaged in an easy-to-use service makes it accessible to less technical criminals.

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users

All articles reposted on this platform are sourced from public networks and are intended solely for the purpose of disseminating industry information. They do not represent any official stance of BTCC. All intellectual property rights belong to their original authors. If you believe any content infringes upon your rights or is suspected of copyright violation, please contact us at [email protected]. We will address the matter promptly and in accordance with applicable laws.BTCC makes no explicit or implied warranties regarding the accuracy, timeliness, or completeness of the republished information and assumes no direct or indirect liability for any consequences arising from reliance on such content. All materials are provided for industry research reference only and shall not be construed as investment, legal, or business advice. BTCC bears no legal responsibility for any actions taken based on the content provided herein.