feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouUnited StatesUnited States
You
bookmarksYour BookmarkshashtagYour Topics
Trending
Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2026 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / Android Malware Hides in AI Platform

Android Malware Hides in AI Platform

30 Jan

•

Summary

  • Malware delivered via Hugging Face platform through fake antivirus app.
  • App demanded updates, installing malicious code that stole data.
  • Hackers created new repositories after initial campaign shutdown.
Android Malware Hides in AI Platform

Cybersecurity researchers have identified a campaign exploiting the Hugging Face platform to distribute Android malware. Malicious actors disguised a threat as an antivirus application called TrustBastion. This app falsely claimed devices were infected, prompting users to update and inadvertently install harmful code.

The malware communicated with a third-party server, which then redirected users to a Hugging Face repository for the malicious APK. The malware possessed capabilities to capture screenshots, display fake payment login interfaces, and steal lock screen codes before exfiltrating data.

This campaign was active for less than a month, accumulating over 6,000 commits. Even after its detection and termination, a new repository with similar malicious code emerged. Experts advise downloading apps only from trusted sources like the Google Play Store or Galaxy Store, and to carefully review app ratings and reviews.

trending

Ohio snow emergency declared

trending

TikTok down in United States

trending

Andreeva matches Venus Williams' feat

trending

Warrington Hospital baby death

trending

Alexander Zverev advances in Australia

trending

Oilers host Capitals

trending

London celebrates Chinese New Year

trending

Liza Minnelli defends AI use

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
Hackers are using the Hugging Face platform to host and distribute Android malware, disguising it within fake applications.
TrustBastion falsely claimed devices were infected and prompted users to update, which installed malicious code designed to steal data.
It is recommended to download Android apps only from reputable sources like the Google Play Store or Galaxy Store, and to check reviews and ratings.

Read more news on

Technologyside-arrow

You may also like

Pixel Phone Bug: Audio Leaked to Callers!

1 day ago • 6 reads

article image

eSIM Frustration: Google's Pixel 10 Forced Switch

5 Jan • 167 reads

article image

Google Photos Video Editor Gets AI Magic

10 Dec, 2025 • 220 reads

article image

Google's XR OS: Smarter Glasses, Realistic Avatars Emerge

8 Dec, 2025 • 271 reads

article image

New Android Malware Steals Bank Funds Remotely

6 Dec, 2025 • 297 reads

article image