Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNews$300 a Month Android Malware ‘Oblivion’ Uses Fake Updates to Hijack Phones
$300 a Month Android Malware ‘Oblivion’ Uses Fake Updates to Hijack Phones
CybersecurityConsumer Tech

$300 a Month Android Malware ‘Oblivion’ Uses Fake Updates to Hijack Phones

•February 25, 2026
0
HackRead
HackRead•Feb 25, 2026

Companies Mentioned

Xiaomi

Xiaomi

01810

Samsung

Samsung

005930

OPPO

OPPO

OnePlus

OnePlus

Google

Google

GOOG

Honor

Honor

Why It Matters

Oblivion demonstrates a commoditized, low‑skill ransomware‑as‑a‑service model that threatens millions of Android users and challenges traditional mobile security defenses.

Key Takeaways

  • •Oblivion sold for $300 monthly subscription.
  • •Uses fake Google Play updates to gain Accessibility Service.
  • •Reads SMS, keylogs, unlocks, streams screen remotely.
  • •Handles 1,000+ victims simultaneously via Tor network.
  • •Bypasses HyperOS, MIUI, One UI, and other skins.

Pulse Analysis

The emergence of Oblivion marks a shift from bespoke Android exploits to a subscription‑based service that anyone with minimal technical knowledge can deploy. By masquerading as a routine system update, the malware sidesteps user awareness and exploits the Accessibility Service, a feature originally designed for assistive technology. This approach lowers the barrier to entry for cyber‑criminals, turning sophisticated remote access capabilities into a commodity that can be purchased on a monthly basis.

From a defensive standpoint, Oblivion’s ability to operate across Android 8 through the upcoming Android 16 and to evade detection on custom skins like HyperOS, MIUI, and One UI underscores the limitations of current mobile security solutions. Traditional antivirus signatures struggle against a platform built from the ground up to avoid behavioural detection, while the inclusion of an APK builder empowers attackers to craft convincing spoofed apps with a few clicks. Enterprises and consumers must therefore prioritize strict app sourcing policies, continuous device monitoring, and rapid response procedures when anomalous update screens appear.

The broader market impact is significant: a $300‑per‑month price point makes high‑grade RAT capabilities accessible to organized crime groups and potentially even individual actors. With the infrastructure capable of handling over a thousand victims simultaneously via Tor, the threat surface expands rapidly. Security vendors will need to adapt by integrating real‑time anomaly detection for update flows and enhancing sandbox analysis of accessibility‑service requests, while regulators may consider tighter oversight of malware‑as‑a‑service marketplaces.

$300 a Month Android Malware ‘Oblivion’ Uses Fake Updates to Hijack Phones

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...