feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouIndiaIndia
You
bookmarksYour BookmarkshashtagYour Topics
Trending
Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2026 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / Android Malware Hides in AI Platform

Android Malware Hides in AI Platform

30 Jan

•

Summary

  • Malware delivered via Hugging Face platform through fake antivirus app.
  • App demanded updates, installing malicious code that stole data.
  • Hackers created new repositories after initial campaign shutdown.
Android Malware Hides in AI Platform

Cybersecurity researchers have identified a campaign exploiting the Hugging Face platform to distribute Android malware. Malicious actors disguised a threat as an antivirus application called TrustBastion. This app falsely claimed devices were infected, prompting users to update and inadvertently install harmful code.

The malware communicated with a third-party server, which then redirected users to a Hugging Face repository for the malicious APK. The malware possessed capabilities to capture screenshots, display fake payment login interfaces, and steal lock screen codes before exfiltrating data.

This campaign was active for less than a month, accumulating over 6,000 commits. Even after its detection and termination, a new repository with similar malicious code emerged. Experts advise downloading apps only from trusted sources like the Google Play Store or Galaxy Store, and to carefully review app ratings and reviews.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
Hackers are using the Hugging Face platform to host and distribute Android malware, disguising it within fake applications.
TrustBastion falsely claimed devices were infected and prompted users to update, which installed malicious code designed to steal data.
It is recommended to download Android apps only from reputable sources like the Google Play Store or Galaxy Store, and to check reviews and ratings.

Read more news on

Technologyside-arrow
trending

Chelsea beats West Ham 3-2

trending

Liverpool, Newcastle face injury woes

trending

WWE Royal Rumble in Riyadh

trending

Barcelona faces Elche in LaLiga

trending

Goretzka staying at Bayern Munich

trending

ICC T20 World Cup squads

trending

Gold, silver ETFs crashed

trending

Curran, Pandya T20Is stats compared

trending

Suryakumar Yadav T20I record

You may also like

Pixel Phone Bug: Audio Leaked to Callers!

29 Jan • 14 reads

article image

eSIM Frustration: Google's Pixel 10 Forced Switch

5 Jan • 178 reads

article image

Google Photos Video Editor Gets AI Magic

10 Dec, 2025 • 228 reads

article image

Google's XR OS: Smarter Glasses, Realistic Avatars Emerge

8 Dec, 2025 • 281 reads

article image

New Android Malware Steals Bank Funds Remotely

6 Dec, 2025 • 303 reads

article image