
Cybersecurity researchers at Bitdefender have uncovered a sophisticated Android malware campaign that leverages Hugging Face, the popular AI and machine learning platform, to distribute remote access trojans (RATs) at scale.
The campaign uses a two-stage infection chain starting with a dropper app called TrustBastion. Victims are lured through scareware-style advertisements claiming their device is infected and urging installation of the fake security tool.
How the Attack Works
Once installed, TrustBastion displays a mandatory update prompt mimicking legitimate Google Play dialogs. Rather than hosting malware directly, the dropper contacts a command server that redirects to Hugging Face infrastructure, where the actual malicious payload is hosted.
What makes this campaign particularly dangerous is its use of server-side polymorphism-attackers generate new payload variants roughly every 15 minutes. Bitdefender researchers found the hosting repository had accumulated over 6,000 commits in just 29 days, each representing a new malware variant designed to evade hash-based detection.
Capabilities of the RAT
The final payload aggressively exploits Android’s Accessibility Services, requesting permissions under the guise of “Phone Security.” Once granted access, the malware can:
- Capture screen content and monitor user activity
- Display fraudulent overlays impersonating financial apps like Alipay and WeChat
- Steal credentials and authentication inputs
- Capture lock screen information
- Block uninstallation attempts
- Maintain persistent communication with command-and-control servers
Why It Matters
The abuse of trusted platforms like Hugging Face represents an evolving threat vector. Traffic from legitimate infrastructure is less likely to trigger security warnings, allowing attackers to fly under the radar. The rapid generation of new variants demonstrates how threat actors are adapting to evade traditional signature-based detection.
After the initial TrustBastion operation was taken down, attackers quickly resurfaced under a new name, “Premium Club,” using the same underlying malicious code-a tactic designed to maximize operational longevity.
Recommendations
Android users should:
- Avoid downloading apps from third-party stores or unknown sources
- Carefully review all permission requests, especially Accessibility Services
- Be skeptical of urgent “security” warnings prompting app installation
- Use reputable mobile security solutions that analyze app behavior, not just signatures
Source: Bitdefender Labs
