{"id":220163,"date":"2025-08-18T18:39:23","date_gmt":"2025-08-19T01:39:23","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=220163"},"modified":"2025-08-19T08:02:57","modified_gmt":"2025-08-19T15:02:57","slug":"android-malware-promises-energy-subsidy-to-steal-financial-data","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/","title":{"rendered":"Android Malware Promises Energy Subsidy to Steal Financial Data"},"content":{"rendered":"<p>Authored by ZePeng Chen<\/p>\n<p>Recently, we identified an active Android phishing campaign targeting Indian users. The attackers impersonate a government electricity subsidy service to lure victims into installing a malicious app. In addition to stealing financial information, the malicious app also steals text messages, uses the infected device to send smishing messages to user\u2019s contact list, can be remotely controlled using Firebase and phishing website and malware was hosted in GitHub. This attack chain leverages YouTube videos, a fake government-like website, and a GitHub-hosted APK file\u2014forming a well-orchestrated social engineering operation. The campaign involves fake subsidy promises, user data theft, and remote-control functionalities, posing a substantial threat to user privacy and financial security.<\/p>\n<p>McAfee, as part of the App Defense Alliance committed to protecting users and the app ecosystem, reported the identified malicious apps to Google. As a result, Google blocked the associated FCM account to prevent further abuse. McAfee also reported the GitHub-hosted repository to GitHub Developer Support Team, which took action and already removed it from GitHub. McAfee Mobile Security detects these malicious applications as a high-risk threat. For more information, and to get fully protected, visit McAfee Mobile Security.<\/p>\n<h2>Background<\/h2>\n<p><a href=\"https:\/\/www.india.gov.in\/spotlight\/pm-surya-ghar-muft-bijli-yojana\">The Government of India<\/a> has approved the PM Surya Ghar: Muft Bijli Yojana on 29th February, 2024 to increase the share of solar rooftop capacity and empower residential households to generate their own electricity. The scheme provides for a subsidy of 60% of the solar unit cost for systems up to 2kW capacity and 40 percent of additional system cost for systems between 2 to 3kW capacity. The subsidy has been capped at 3kW capacity. The interested consumer has to register on the National Portal. This has to be done by selecting the state and the electricity distribution company. Scammers use this subsidy activity to create phishing websites and fake applications, stealing the bank account information of users who want to apply for this subsidy.<\/p>\n<h2>Technical Findings<\/h2>\n<h3>Distribution Methods<\/h3>\n<p>This phishing operation unfolds in multiple stages:<\/p>\n<ol>\n<li><strong>YouTube Video Lure<\/strong>: The attackers upload promotional videos claiming users can receive \u201cgovernment electricity subsidies\u201d through a mobile app. A shortened URL is included in the video description to encourage users to click.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-220182\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-1.-YouTube-video-promoting-the-phishing-URL.png\" alt=\"\" width=\"615\" height=\"1366\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-1.-YouTube-video-promoting-the-phishing-URL.png 864w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-1.-YouTube-video-promoting-the-phishing-URL-135x300.png 135w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-1.-YouTube-video-promoting-the-phishing-URL-461x1024.png 461w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-1.-YouTube-video-promoting-the-phishing-URL-768x1707.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-1.-YouTube-video-promoting-the-phishing-URL-691x1536.png 691w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-1.-YouTube-video-promoting-the-phishing-URL-58x129.png 58w\" sizes=\"auto, (max-width: 615px) 100vw, 615px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 1<\/strong>. YouTube video promoting the phishing URL<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\">\u00a0 \u00a0 \u00a02. <strong>Phishing Website Imitation: <\/strong>The shortened URL redirects to a phishing website hosted on GitHub. it designed to closely resemble an official Indian government <a href=\"https:\/\/pmsuryaghar.gov.in\/\">portal<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-220197\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-2.-Phishing-and-official-website.png\" alt=\"\" width=\"604\" height=\"900\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-2.-Phishing-and-official-website.png 604w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-2.-Phishing-and-official-website-201x300.png 201w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-2.-Phishing-and-official-website-87x129.png 87w\" sizes=\"auto, (max-width: 604px) 100vw, 604px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 2.<\/strong> Phishing and official website<\/p>\n<p>The phishing site has a fake registration process instruction, once the users believe this introduction, they will not have any doubts about the following processes. The phishing site also has a fake Google Play icon, making users believe it&#8217;s a Google Play app, but in reality, the icon points to an APK file on GitHub. When victims click the Google Play icon, it will download the APK from GitHub repository instead of accessing Google Play App Store.<\/p>\n<p><strong>\u00a0 \u00a0 3. GitHub-Hosted APK and Phishing page<\/strong><\/p>\n<p>Both the phishing site source and the APK file are hosted on the same GitHub repository\u2014likely to bypass security detection and appear more legitimate. The repository activity shows that this malicious app has been continuously developed since October 2024, with frequent updates observed in recent weeks.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-220212\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-3.-Malware-repository-in-GitHub.png\" alt=\"\" width=\"697\" height=\"517\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-3.-Malware-repository-in-GitHub.png 824w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-3.-Malware-repository-in-GitHub-300x222.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-3.-Malware-repository-in-GitHub-768x569.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-3.-Malware-repository-in-GitHub-174x129.png 174w\" sizes=\"auto, (max-width: 697px) 100vw, 697px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 3.<\/strong> Malware repository in GitHub<\/p>\n<h2>Installation without network<\/h2>\n<p>The downloaded APK is not the main malicious component. Instead, it contains an embedded APK file at assets\/app.apk, which is the actual malware. The initial APK serves only to install the embedded one. During installation, users are deceived into believing they are installing a \u201csecurity update\u201d and are prompted to disable mobile data or Wi-Fi, likely to reduce the effectiveness of malware detection solutions that use detection technologies in the cloud. But McAfee is still able to detect this threat in offline mode<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-220227\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-4.-Install-malicious-APK-without-network.png\" alt=\"\" width=\"944\" height=\"1048\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-4.-Install-malicious-APK-without-network.png 1728w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-4.-Install-malicious-APK-without-network-270x300.png 270w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-4.-Install-malicious-APK-without-network-922x1024.png 922w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-4.-Install-malicious-APK-without-network-768x853.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-4.-Install-malicious-APK-without-network-1382x1536.png 1382w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-4.-Install-malicious-APK-without-network-116x129.png 116w\" sizes=\"auto, (max-width: 944px) 100vw, 944px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 4.<\/strong> Install a malicious APK without a network<\/p>\n<p>According to the installation instructions, a malicious application will be installed. There are 2 applications that are installed on devices.<\/p>\n<ul>\n<li>PMBY \u2013 The initial APK, it is used to install PMMBY.<\/li>\n<li>PMMBY \u2013 Malware APK, it is installed under the guise of \u201cSecure Update\u201c<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-220242\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-5.-Application-names-and-icons.png\" alt=\"\" width=\"372\" height=\"192\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-5.-Application-names-and-icons.png 273w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-5.-Application-names-and-icons-205x106.png 205w\" sizes=\"auto, (max-width: 372px) 100vw, 372px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 5.<\/strong> Application names and icons.<\/p>\n<h2>Malware analysis<\/h2>\n<p>PMMBY is an application that actually carries out malicious behavior\u2014let\u2019s delve into the concrete details of how it accomplishes this.<\/p>\n<p>It requests aggressive permission when it is launched.<\/p>\n<ul>\n<li>READ_CONTACTS \u2013 Read contacts list<\/li>\n<li>CALL_PHONE \u2013 Make\/manage phone calls<\/li>\n<li>READ_SMS, SEND_SMS \u2013 View and send SMS messages<\/li>\n<li>Notification access \u2013 For spamming or masking malicious actions<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-220257\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.27.33.jpg\" alt=\"\" width=\"1476\" height=\"797\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.27.33.jpg 1920w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.27.33-300x162.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.27.33-1024x553.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.27.33-768x415.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.27.33-1536x830.jpg 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.27.33-205x111.jpg 205w\" sizes=\"auto, (max-width: 1476px) 100vw, 1476px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 6.<\/strong> Aggressive permissions request<\/p>\n<p><strong>Fake UI and Registration Process<\/strong><\/p>\n<p>Once permissions are granted, the app displays a fake electricity provider selection screen. The message \u201cTo Get 300 Unit Free Every Month Please Select Your Electricity Provider From Below And Proceed\u201d is shown in English and Hindi to prompt users to select their provider.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-220272\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-7.-SELECT-YOUR-PROVIDER-Activity.png\" alt=\"\" width=\"538\" height=\"1196\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-7.-SELECT-YOUR-PROVIDER-Activity.png 864w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-7.-SELECT-YOUR-PROVIDER-Activity-135x300.png 135w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-7.-SELECT-YOUR-PROVIDER-Activity-461x1024.png 461w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-7.-SELECT-YOUR-PROVIDER-Activity-768x1707.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-7.-SELECT-YOUR-PROVIDER-Activity-691x1536.png 691w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-7.-SELECT-YOUR-PROVIDER-Activity-58x129.png 58w\" sizes=\"auto, (max-width: 538px) 100vw, 538px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 7.<\/strong> \u201cSELECT YOUR PROVIDER\u201d Activity<\/p>\n<p>&nbsp;<\/p>\n<p>After selecting a provider, the app presents a fake registration form asking for the user\u2019s phone number and a \u20b91 payment to \u201cgenerate a registration token.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-220287\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-8.-Registration-Form.png\" alt=\"\" width=\"605\" height=\"1344\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-8.-Registration-Form.png 1080w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-8.-Registration-Form-135x300.png 135w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-8.-Registration-Form-461x1024.png 461w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-8.-Registration-Form-768x1707.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-8.-Registration-Form-691x1536.png 691w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-8.-Registration-Form-922x2048.png 922w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-8.-Registration-Form-58x129.png 58w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 8<\/strong>. Registration Form<\/p>\n<p>&nbsp;<\/p>\n<p>In this stage, malware creates a background task to send a https request to https[:\/\/]rebrand[.]ly\/dclinkto2. The response text is https[:\/\/]sqcepo[.]replit[.]app\/gate[.]html,https[:\/\/]sqcepo[.]replit[.]app\/addsm[.]php. The string is split as 2 URLs.<\/p>\n<ul>\n<li>UPI PIN URL \u2013 https[:\/\/]sqcepo[.]replit[.]app\/gate[.]html. It will be used in \u201cENTER UPI PIN\u201d process. When malware uses this URL, \u201cgate.html\u201d will be replace with\u201cgate.hml\u201d, so the loaded URL is https[:\/\/]sqcepo[.]replit[.]app\/gate[.]htm.<\/li>\n<li>SMS Uploaded URL \u2013 https[:\/\/]sqcepo[.]replit[.]app\/addsm[.]php. SMS incoming messages are uploaded to this URL.<\/li>\n<li><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-220302\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-9.-dclinkto2-request.png\" alt=\"\" width=\"772\" height=\"296\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-9.-dclinkto2-request.png 772w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-9.-dclinkto2-request-300x115.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-9.-dclinkto2-request-768x294.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-9.-dclinkto2-request-205x79.png 205w\" sizes=\"auto, (max-width: 772px) 100vw, 772px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 9.<\/strong> dclinkto2 request<\/p>\n<p>&nbsp;<\/p>\n<p>In the stage of \u201dMAKE PAYMENT of \u20b9 1\u201c\uff0cvictims are asked to use \u201cUPI-Lite\u201d app to complete the payment. In the \u201cUPI-Lite\u201d activity, victims enter the bank UPI PIN code.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-220317\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-10.-The-process-of-ENTER-UPI-PIN-.png\" alt=\"\" width=\"982\" height=\"1091\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-10.-The-process-of-ENTER-UPI-PIN-.png 1728w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-10.-The-process-of-ENTER-UPI-PIN--270x300.png 270w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-10.-The-process-of-ENTER-UPI-PIN--922x1024.png 922w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-10.-The-process-of-ENTER-UPI-PIN--768x853.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-10.-The-process-of-ENTER-UPI-PIN--1382x1536.png 1382w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-10.-The-process-of-ENTER-UPI-PIN--116x129.png 116w\" sizes=\"auto, (max-width: 982px) 100vw, 982px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 10.<\/strong> The process of \u201cENTER UPI PIN\u201d<\/p>\n<h2>UPI Credential Theft<\/h2>\n<p>UPI-Lite activity is a fake HTML-based form from https[:\/\/]sqcepo[.]replit[.]app\/gate[.]htm.<\/p>\n<p>Once submitted, the phone number, bank details, and UPI PIN are uploaded to https[:\/\/]sqcepo[.]replit[.]app\/addup.php. After the attacker obtains this information, they can steal money from your bank account.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-220332\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-11.-Post-users-banker-information.png\" alt=\"\" width=\"1057\" height=\"166\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-11.-Post-users-banker-information.png 821w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-11.-Post-users-banker-information-300x47.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-11.-Post-users-banker-information-768x121.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-11.-Post-users-banker-information-205x32.png 205w\" sizes=\"auto, (max-width: 1057px) 100vw, 1057px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 11.<\/strong> Post user\u2019s banker information.<\/p>\n<h2>Malware Background Behaviors<\/h2>\n<p>In addition to stealing the financial and banking information from the user, the malware is also able to send distribution itself by sending a phishing message to the victim\u2019s contact list, stealing user\u2019s text messages probably to intercept 2FA codes and can be remotely controlled via Firebase.<\/p>\n<ul>\n<li>Send mass phishing SMS messages to Indian users from the victims\u2019 contacts list.<\/li>\n<li><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-220347\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-12.-Send-Phishing-SMS-message.png\" alt=\"\" width=\"1393\" height=\"510\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-12.-Send-Phishing-SMS-message.png 1393w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-12.-Send-Phishing-SMS-message-300x110.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-12.-Send-Phishing-SMS-message-1024x375.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-12.-Send-Phishing-SMS-message-768x281.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-12.-Send-Phishing-SMS-message-205x75.png 205w\" sizes=\"auto, (max-width: 1393px) 100vw, 1393px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 12<\/strong>. Send Phishing SMS message.<\/p>\n<ul>\n<li><strong>Upload SMS message to Server.<\/strong><\/li>\n<\/ul>\n<p>Malware has requested view SMS permission when it is launched. When it receives the incoming SMS message, it handles the message and posts below data to remote server(https[:\/\/]sqcepo[.]replit[.]app\/addsm[.]php).<\/p>\n<ul>\n<li>senderNum: The phone number of send the incoming message.<\/li>\n<li>Message: The incoming SMS message.<\/li>\n<li>Slot: Which SIM Slot to receive the message<\/li>\n<li>Device rand: A random number was created during the first run to identify the device.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-220362\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-13.-Post-Incoming-SMS-message.png\" alt=\"\" width=\"1076\" height=\"491\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-13.-Post-Incoming-SMS-message.png 1076w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-13.-Post-Incoming-SMS-message-300x137.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-13.-Post-Incoming-SMS-message-1024x467.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-13.-Post-Incoming-SMS-message-768x350.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-13.-Post-Incoming-SMS-message-205x94.png 205w\" sizes=\"auto, (max-width: 1076px) 100vw, 1076px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 13<\/strong>. Post Incoming SMS message<\/p>\n<ul>\n<li><strong>Firebase as a Command Channel.<\/strong><\/li>\n<\/ul>\n<p>Attackers use FCM(Firebase Cloud Messaging) to send commands to control devices. According to the _type value, malware executes different commands.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-220377\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.12.03.jpg\" alt=\"\" width=\"836\" height=\"207\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.12.03.jpg 1593w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.12.03-300x74.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.12.03-1024x253.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.12.03-768x190.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.12.03-1536x380.jpg 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.12.03-205x51.jpg 205w\" sizes=\"auto, (max-width: 836px) 100vw, 836px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Table1.<\/strong> Commands from FCM message<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-220393\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-14.-Commands-from-FCM-message.png\" alt=\"\" width=\"1051\" height=\"510\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-14.-Commands-from-FCM-message.png 1051w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-14.-Commands-from-FCM-message-300x146.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-14.-Commands-from-FCM-message-1024x497.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-14.-Commands-from-FCM-message-768x373.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/Figure-14.-Commands-from-FCM-message-205x99.png 205w\" sizes=\"auto, (max-width: 1051px) 100vw, 1051px\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 14.<\/strong> Commands from FCM message<\/p>\n<h2>Recommendations<\/h2>\n<p>To protect against such sophisticated attacks, users and defenders should take the following precautions:<\/p>\n<ul>\n<li><strong>Avoid downloading apps from unofficial websites:<\/strong><br \/>\nEspecially those offering benefits like subsidies, rewards, or financial aid.<\/li>\n<li><strong>Be cautious of apps that require disabling network connections:<\/strong><br \/>\nThis is often a red flag used to evade real-time antivirus scanning.<\/li>\n<li><strong>Carefully review app permissions:<\/strong><br \/>\nApps requesting contact access, SMS read\/send or call permissions\u2014without clear reason\u2014should be treated as suspicious.<\/li>\n<li><strong>Use security software with SMS protection:<\/strong><br \/>\nEnable permission alerts and use reputable mobile security apps to detect abnormal app behavior. <a href=\"https:\/\/www.mcafee.com\/en-us\/scam-detector\/\">McAfee&#8217;s Scam Detector<\/a> as an additional protection for the smishing part.<\/li>\n<\/ul>\n<p>Cybercriminals are using relevant themes like energy subsidies to trick users into providing financial information. This campaign demonstrates an integrated and stealthy attack chain. YouTube is used to distribute phishing link, GitHub is a reliable and legitimate website to using it to both distribute malicious APKs and serve phishing websites make it more difficult to identify and take it down, and malware authors can remotely update the phishing text messages to be more effective in tricking users into installing the malware via Firebase Cloud Messaging (FCM). With its self-propagation capabilities, financial data theft, and remote-control functions, it poses a serious risk. We will continue to monitor this threat, track emerging variants, and coordinate with relevant platforms to report and help take down associated infrastructure.<\/p>\n<h2>Indicators of Compromise (IOCs)<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-220166\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.21.22.jpg\" alt=\"\" width=\"1299\" height=\"566\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.21.22.jpg 1450w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.21.22-300x131.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.21.22-1024x446.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.21.22-768x335.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/CleanShot-2025-08-18-at-18.21.22-205x89.jpg 205w\" sizes=\"auto, (max-width: 1299px) 100vw, 1299px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by ZePeng Chen Recently, we identified an active Android phishing campaign targeting Indian users. The attackers impersonate a government&#8230;<\/p>\n","protected":false},"author":695,"featured_media":220413,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-220163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Android Malware Promises Energy Subsidy to Steal Financial Data | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by ZePeng Chen Recently, we identified an active Android phishing campaign targeting Indian users. The attackers impersonate a government\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Malware Promises Energy Subsidy to Steal Financial Data | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by ZePeng Chen Recently, we identified an active Android phishing campaign targeting Indian users. The attackers impersonate a government\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-19T01:39:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T15:02:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2370839271.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Android Malware Promises Energy Subsidy to Steal Financial Data\",\"datePublished\":\"2025-08-19T01:39:23+00:00\",\"dateModified\":\"2025-08-19T15:02:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/\"},\"wordCount\":1456,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2370839271.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/\",\"name\":\"Android Malware Promises Energy Subsidy to Steal Financial Data | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2370839271.jpg\",\"datePublished\":\"2025-08-19T01:39:23+00:00\",\"dateModified\":\"2025-08-19T15:02:57+00:00\",\"description\":\"Authored by ZePeng Chen Recently, we identified an active Android phishing campaign targeting Indian users. The attackers impersonate a government\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2370839271.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2370839271.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Android Malware Promises Energy Subsidy to Steal Financial Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Android Malware Promises Energy Subsidy to Steal Financial Data | McAfee Blog","description":"Authored by ZePeng Chen Recently, we identified an active Android phishing campaign targeting Indian users. The attackers impersonate a government","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Android Malware Promises Energy Subsidy to Steal Financial Data | McAfee Blog","og_description":"Authored by ZePeng Chen Recently, we identified an active Android phishing campaign targeting Indian users. The attackers impersonate a government","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2025-08-19T01:39:23+00:00","article_modified_time":"2025-08-19T15:02:57+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2370839271.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Android Malware Promises Energy Subsidy to Steal Financial Data","datePublished":"2025-08-19T01:39:23+00:00","dateModified":"2025-08-19T15:02:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/"},"wordCount":1456,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2370839271.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/","name":"Android Malware Promises Energy Subsidy to Steal Financial Data | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2370839271.jpg","datePublished":"2025-08-19T01:39:23+00:00","dateModified":"2025-08-19T15:02:57+00:00","description":"Authored by ZePeng Chen Recently, we identified an active Android phishing campaign targeting Indian users. The attackers impersonate a government","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2370839271.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2370839271.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/android-malware-promises-energy-subsidy-to-steal-financial-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Android Malware Promises Energy Subsidy to Steal Financial Data"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/220163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=220163"}],"version-history":[{"count":11,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/220163\/revisions"}],"predecessor-version":[{"id":220837,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/220163\/revisions\/220837"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/220413"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=220163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=220163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=220163"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=220163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}