{"id":55191,"date":"2026-01-27T11:36:28","date_gmt":"2026-01-27T16:36:28","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=55191"},"modified":"2026-01-27T11:36:28","modified_gmt":"2026-01-27T16:36:28","slug":"growing-2026-android-threats-and-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/growing-2026-android-threats-and-protection\/55191\/","title":{"rendered":"The perfect storm of Android threats"},"content":{"rendered":"<p>The year 2025 saw a record-breaking number of attacks on Android devices. Scammers are currently riding a few major waves: the hype surrounding AI apps, the urge to bypass site blocks or age checks, the hunt for a bargain on a new smartphone, the ubiquity of mobile banking, and, of course, the popularity of NFC. Let\u2019s break down the primary threats of 2025\u20132026, and figure out how to keep your Android device safe in this new landscape.<\/p>\n<h2>Sideloading<\/h2>\n<p>Malicious installation packages (APK files) have always been the Final Boss among Android threats, despite Google\u2019s multi-year efforts to fortify the OS. By using sideloading \u2014 installing an app via an APK file instead of grabbing it from the official store \u2014 users can install pretty much anything, including straight-up malware. And neither the rollout of Google Play Protect, nor the various permission restrictions for shady apps have managed to put a dent in the scale of the problem.<\/p>\n<p>According to preliminary data from Kaspersky for 2025, the number of detected Android threats <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/kaspersky-report-attacks-on-smartphones-increased-in-the-first-half-of-2025\" target=\"_blank\" rel=\"noopener nofollow\">grew almost by half<\/a>. In the third quarter alone, detections <a href=\"https:\/\/securelist.com\/malware-report-q3-2025-mobile-statistics\/118013\/\" target=\"_blank\" rel=\"noopener\">jumped by 38%<\/a> compared to the second. In certain niches, like Trojan bankers, the growth was even more aggressive. In Russia alone, the <a href=\"https:\/\/www.kaspersky.com\/blog\/mamont-banker-tracking-app\/52786\/\" target=\"_blank\" rel=\"noopener nofollow\">notorious Mamont banker<\/a> attacked 36 times more users than it did the previous year, while globally this entire category saw a nearly fourfold increase.<\/p>\n<p>Today, bad actors primarily distribute malware via messaging apps by sliding malicious files into DMs and group chats. The installation file usually sports an enticing name (think \u201cparty_pics.jpg.apk\u201d or \u201cclearance_sale_catalog.apk\u201d), accompanied by a message \u201chelpfully\u201d explaining how to install the package while bypassing the OS restrictions and security warnings.<\/p>\n<p>Once a new device is infected, the malware often spams itself to everyone in the victim\u2019s contact list.<\/p>\n<p>Search engine spam and email campaigns are also trending, luring users to sites that look exactly like an official app store. There, they\u2019re prompted to download the \u201clatest helpful app\u201d, such as an AI assistant. In reality, instead of an installation from an official app store, the user ends up downloading an APK package. A prime example of these tactics is the <a href=\"https:\/\/zimperium.com\/blog\/clayrat-a-new-android-spyware-targeting-russia\" target=\"_blank\" rel=\"noopener nofollow\">ClayRat Android Trojan<\/a>, which uses a mix of all these techniques to target Russian users. It spreads through groups and fake websites, blasts itself to the victim\u2019s contacts via SMS, and then proceeds to steal the victim\u2019s chat logs and call history; it even goes as far as snapping photos of the owner using the front-facing camera. In just three months, over 600 distinct ClayRat builds have surfaced.<\/p>\n<p>The scale of the disaster is so massive that Google even <a href=\"https:\/\/www.androidpolice.com\/google-tries-to-justify-androids-upcoming-sideloading-restrictions\/\" target=\"_blank\" rel=\"noopener nofollow\">announced an upcoming ban<\/a> on distributing apps from unknown developers starting in 2026. However, after a couple of months of pushback from the dev community, the company <a href=\"https:\/\/www.theverge.com\/news\/819835\/google-android-sideloading-experienced-users-developer-verification\" target=\"_blank\" rel=\"noopener nofollow\">pivoted<\/a> to a softer approach: unsigned apps will likely only be installable via some kind of superuser mode. As a result, we can expect scammers to simply update their how-to guides with instructions on how to toggle that mode on.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky for Android<\/a> will help you protect yourself from counterfeit and trojanized APK files. Unfortunately, due to Google\u2019s decision, our Android security apps are currently unavailable on Google Play. We\u2019ve previously provided detailed information on <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-apps-removed-from-google-play\/52254\/\" target=\"_blank\" rel=\"noopener nofollow\">how to install our Android apps with a 100% guarantee of authenticity<\/a>.<\/p>\n<h2>NFC relay attacks<\/h2>\n<p>Once an Android device is compromised, hackers can skip the middleman to steal the victim\u2019s money directly thanks to the massive popularity of mobile payments. In the third quarter of 2025 alone, over 44\u00a0000 of these attacks were detected in Russia alone \u2014 a 50% jump from the previous quarter.<\/p>\n<p>There are two main scams currently in play: direct and reverse NFC exploits.<\/p>\n<p>Direct NFC relay is when a scammer contacts the victim via a messaging app and convinces them to download an app \u2014 supposedly to \u201cverify their identity\u201d with their bank. If the victim bites and installs it, they\u2019re asked to tap their physical bank card against the back of their phone and enter their PIN. And just like that the card data is handed over to the criminals, who can then drain the account or go on a shopping spree.<\/p>\n<p>Reverse NFC relay is a more elaborate scheme. The scammer sends a malicious APK and convinces the victim to set this new app as their primary contactless payment method. The app generates an NFC signal that ATMs recognize as the scammer\u2019s card. The victim is then talked into going to an ATM with their infected phone to deposit cash into a \u201csecure account\u201d. In reality, those funds go straight into the scammer\u2019s pocket.<\/p>\n<p>We break both of these methods down in detail in our post, <a href=\"https:\/\/www.kaspersky.com\/blog\/nfc-gate-relay-attacks-2026\/55116\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>NFC skimming attacks<\/strong><\/a>.<\/p>\n<p>NFC is also being leveraged to cash out cards after their details have been siphoned off through phishing websites. In this scenario, attackers attempt to link the stolen card to a mobile wallet on their own smartphone \u2014 a scheme we covered extensively in <a href=\"https:\/\/www.kaspersky.com\/blog\/apple-google-nfc-carding-theft-2025\/53267\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>NFC carders hide behind Apple Pay and Google Wallet<\/strong><\/a>.<\/p>\n<h2>The stir over VPNs<\/h2>\n<p>In many parts of the world, getting onto certain websites isn\u2019t as simple as it used to be. Some sites are blocked by local internet regulators or ISPs via court orders; others require users to pass an age verification check by showing ID and personal info. In some cases, sites block users from specific countries entirely just to avoid the headache of complying with local laws. Users are constantly trying to bypass these restrictions \u2014and they often end up paying for it with their data or cash.<\/p>\n<p>Many popular tools for bypassing blocks \u2014 especially free ones \u2014 effectively spy on their users. A recent audit revealed that over 20 popular services with a combined total of more than 700 million downloads actively <a href=\"https:\/\/www.techspot.com\/news\/109132-massively-popular-android-vpn-apps-insecure-all-secretly.html\" target=\"_blank\" rel=\"noopener nofollow\">track user location<\/a>. They also tend to use sketchy encryption at best, which essentially leaves all user data out in the open for third parties to intercept.<\/p>\n<p>Moreover, according to <a href=\"https:\/\/www.tomsguide.com\/computing\/vpns\/google-issues-official-warning-that-vpn-scams-are-on-the-rise-heres-how-to-avoid-them\" target=\"_blank\" rel=\"noopener nofollow\">Google data from November 2025<\/a>, there was a sharp spike in cases where <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-wrong-with-free-vpn-services\/51721\/\" target=\"_blank\" rel=\"noopener nofollow\">malicious apps are being disguised as legitimate VPN<\/a> services to trick unsuspecting users.<\/p>\n<p>The permissions that this category of apps actually requires are a perfect match for intercepting data and manipulating website traffic. It\u2019s also much easier for scammers to convince a victim to grant administrative privileges to an app responsible for internet access than it is for, say, a game or a music player. We should expect this scheme to only grow in popularity.<\/p>\n<h2>Trojan in a box<\/h2>\n<p>Even cautious users can fall victim to an infection if they succumb to the urge to save some cash. Throughout 2025, cases were reported worldwide where devices were <a href=\"https:\/\/www.kaspersky.com\/blog\/trojan-in-fake-smartphones\/53331\/\" target=\"_blank\" rel=\"noopener nofollow\">already carrying a Trojan the moment they were unboxed<\/a>. Typically, these were either smartphones from obscure manufacturers or knock-offs of famous brands purchased on online marketplaces. But the threat wasn\u2019t limited to just phones; <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-avoid-threats-from-budget-android-devices\/49565\/\" target=\"_blank\" rel=\"noopener nofollow\">TV boxes, tablets, smart TVs<\/a>, and even <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/popular-android-based-photo-frames-download-malware-on-boot\/\" target=\"_blank\" rel=\"noopener nofollow\">digital photo frames<\/a> were all found to be at risk.<\/p>\n<p>It\u2019s still not entirely clear whether the infection happens right on the factory floor or somewhere along the supply chain between the factory and the buyer\u2019s doorstep, but the device is already infected before the first time it\u2019s turned on. Usually, it\u2019s a sophisticated piece of malware called Triada, <a href=\"https:\/\/www.kaspersky.com\/blog\/triada-trojan\/11481\/\" target=\"_blank\" rel=\"noopener nofollow\">first identified by Kaspersky analysts back in 2016<\/a>. It\u2019s capable of injecting itself into every running app to intercept information: stealing access tokens and passwords for popular messaging apps and social media, hijacking SMS messages (confirmation codes: ouch!), redirecting users to ad-heavy sites, and even running a proxy directly on the phone so attackers can browse the web using the victim\u2019s identity.<\/p>\n<p>Technically, the Trojan is embedded right into the smartphone\u2019s firmware, and the only way to kill it is to reflash the device with a clean OS. Usually, once you dig into the system, you\u2019ll find that the device has far less RAM or storage than advertised \u2014 meaning the firmware is literally lying to the owner to sell a cheap hardware config as something more premium.<\/p>\n<p>Another common pre-installed menace is the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-badbox-20-android-malware-infects-millions-of-consumer-devices\/\" target=\"_blank\" rel=\"noopener nofollow\">BADBOX 2.0<\/a> botnet, which also pulls double duty as a proxy and an ad-fraud engine. This one specializes in TV boxes and similar hardware.<\/p>\n<h2>How to go on using Android without losing your mind<\/h2>\n<p>Despite the growing list of threats, you can still use your Android smartphone safely! You just have to stick to some strict mobile hygiene rules.<\/p>\n<ul>\n<li>Install a comprehensive security solution on all your smartphones. We recommend <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky for Android<\/a>\u00a0to protect against malware and phishing.<\/li>\n<li>Avoid sideloading apps via APKs whenever you can use an app store instead. A known app store \u2014 even a smaller one \u2014 is always a better bet than a random APK from some random website. If you have no other choice, download APK files only from official company websites, and double-check the URL of the page you\u2019re on. If you aren\u2019t 100% sure what the official site is, don\u2019t just rely on a search engine; check official business directories or at least Wikipedia to verify the correct address.<\/li>\n<li>Read OS warnings carefully during installation. Don\u2019t grant permissions if the requested rights or actions seem illogical or excessive for the app you\u2019re installing.<\/li>\n<li>Under no circumstances should you install apps from links or attachments in chats, emails, or similar communication channels.<\/li>\n<li>Never <a href=\"https:\/\/www.kaspersky.com\/blog\/nfc-gate-relay-attacks-2026\/55116\/\" target=\"_blank\" rel=\"noopener nofollow\">tap your physical bank card against your phone<\/a>. There is absolutely no legitimate scenario where doing this would be for your own benefit.<\/li>\n<li>Do not enter your card\u2019s PIN into any app on your phone. A PIN should only ever be requested by an ATM or a physical payment terminal.<\/li>\n<li>When choosing a VPN, stick to <a href=\"https:\/\/www.kaspersky.com\/vpn-secure-connection?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____vpn___\" target=\"_blank\" rel=\"noopener nofollow\">paid ones from reputable companies<\/a>.<\/li>\n<li>Buy smartphones and other electronics from official retailers, and steer clear of brands you\u2019ve never heard of. Remember: if a deal seems too good to be true, it almost certainly is.<\/li>\n<\/ul>\n<blockquote><p>Other major Android threats from 2025:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/pixnapping-cve-2025-48561\/54756\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Pixnapping vulnerability: unblockable screenshots of your Android phone<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/disguised-spy-for-android\/54051\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Spyware that pretends to be an antivirus<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/data-theft-during-charging-choicejacking-protection\/53497\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Data theft during smartphone charging<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ios-android-ocr-stealer-sparkcat\/52980\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>SparkCat trojan stealer infiltrates App Store and Google Play, steals data from photos<\/strong><\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-3\">\n","protected":false},"excerpt":{"rendered":"<p>NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.<\/p>\n","protected":false},"author":2722,"featured_media":55193,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[105,4531,821,43,97,660,508,422,154,709],"class_list":{"0":"post-55191","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-fakes","10":"tag-nfc","11":"tag-privacy","12":"tag-security-2","13":"tag-smart-home","14":"tag-smart-tv","15":"tag-threats","16":"tag-viruses","17":"tag-vpn"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/growing-2026-android-threats-and-protection\/55191\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/growing-2026-android-threats-and-protection\/30114\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/growing-2026-android-threats-and-protection\/25175\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/growing-2026-android-threats-and-protection\/13161\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/growing-2026-android-threats-and-protection\/29992\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/growing-2026-android-threats-and-protection\/28952\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/growing-2026-android-threats-and-protection\/31816\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/growing-2026-android-threats-and-protection\/30435\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/growing-2026-android-threats-and-protection\/41204\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/growing-2026-android-threats-and-protection\/14232\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/growing-2026-android-threats-and-protection\/23558\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/growing-2026-android-threats-and-protection\/30195\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/growing-2026-android-threats-and-protection\/35876\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/growing-2026-android-threats-and-protection\/35531\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/55191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=55191"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/55191\/revisions"}],"predecessor-version":[{"id":55194,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/55191\/revisions\/55194"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/55193"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=55191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=55191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=55191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}