Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsHugging Face Abused to Spread Thousands of Android Malware Variants
Hugging Face Abused to Spread Thousands of Android Malware Variants
Cybersecurity

Hugging Face Abused to Spread Thousands of Android Malware Variants

•January 29, 2026
0
BleepingComputer
BleepingComputer•Jan 29, 2026

Companies Mentioned

Hugging Face

Hugging Face

Google

Google

GOOG

Why It Matters

The abuse of a trusted AI model repository highlights emerging supply‑chain risks, eroding confidence in platforms once considered safe for code distribution. It forces security teams to broaden monitoring to include machine‑learning hubs and reinforces the need for rapid collaboration between vendors and platform operators.

Key Takeaways

  • •Hugging Face hosted over 6,000 malicious APK variants.
  • •Dropper app TrustBastion masquerades as security tool.
  • •Polymorphic server creates new payload every 15 minutes.
  • •Malware exploits Android Accessibility Services for screen capture.
  • •Hugging Face removed malicious datasets after Bitdefender alert.

Pulse Analysis

Hugging Face has become a cornerstone for AI researchers, offering a centralized marketplace for models, datasets, and code. Its reputation for hosting vetted machine‑learning artifacts makes it an unlikely source of malicious activity, which in turn shields uploads from conventional security warnings. Yet the platform’s open‑submission model and robust content‑delivery network have attracted threat actors seeking a trusted conduit for malware. Earlier incidents showed malicious AI models slipping through, and the latest campaign escalates the risk by leveraging the same infrastructure to distribute Android payloads at scale.

The infection chain starts with a scare‑ware app named TrustBastion, which pretends to be a security scanner and pushes a fake Google Play update prompt. Once installed, the dropper contacts a command server that redirects the device to a Hugging Face dataset repository, where a new APK is fetched from the platform’s CDN. Bitdefender observed more than 6,000 commits over a 29‑day window, with server‑side polymorphism generating a fresh variant every fifteen minutes. The downloaded RAT hijacks Android’s Accessibility Services, enabling screen overlays, credential‑phishing pages for Alipay and WeChat, and lock‑screen code theft.

The abuse underscores a growing supply‑chain threat where trusted developer hubs become inadvertent malware distributors. Security teams must extend monitoring beyond traditional app stores to include AI model repositories and their CDN endpoints, employing hash‑based detection and behavioral analytics to spot rapidly changing payloads. Collaboration between platform operators and incident‑response firms, as demonstrated by Bitdefender’s notification to Hugging Face, is essential for swift takedowns. For end users, the safest practice remains installing applications exclusively from official stores and scrutinizing permission requests, especially those that invoke Accessibility Services.

Hugging Face abused to spread thousands of Android malware variants

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...