Connect with us

News

Hackers Exploit Meta Ads With Fake TradingView Premium App to Spread Android Malware

Published

on

Cybercriminals are running a new ad scam across Meta’s platforms, luring users with free TradingView Premium offers that secretly install Brokewell malware on Android devices. The campaign, active since July, has been traced to at least 75 localized ads and is now being flagged as a serious threat to cryptocurrency investors.

A Trap Disguised as TradingView

Bitdefender researchers uncovered the operation this week. Fake ads used TradingView’s branding, colors, and professional-style visuals to hook mobile users. But the catch? The download link didn’t lead to TradingView’s site. Instead, Android users were redirected to a counterfeit page delivering a malicious file named tw-update.apk.

Those who installed it unknowingly gave the malware everything it needed. The fake app immediately requested accessibility permissions, then pushed a full-screen fake “system update” prompt. Behind the scenes, it quietly granted itself sweeping device controls.

One researcher put it bluntly: “The malware hides behind what looks like a regular update, but in reality, it’s opening the door for attackers to take over the phone.”

fake tradingview app android malware 2025

Designed for Mobile, Ignored on Desktop

An unusual detail stood out in Bitdefender’s analysis. The campaign was fine-tuned to strike only mobile users. Anyone clicking the same ad on Windows or iOS would see harmless content—basically a decoy.

On Android though, the trap was sprung. Victims saw a TradingView lookalike website, complete with branding, logos, and copycat design. The sophisticated targeting makes sense: most cryptocurrency users check trading apps on their phones, not desktops.

What Brokewell Can Do

The malware at the center of this scam, Brokewell, isn’t new. It’s been tracked since early 2024, but this version is described as “an advanced build” with one of the broadest toolsets researchers have seen on mobile.

Its list of capabilities reads like a hacker’s wishlist:

  • Steals Bitcoin, Ethereum, and Tether wallet data, as well as bank account details

  • Extracts Google Authenticator codes, effectively bypassing two-factor authentication

  • Creates fake login screens to steal exchange and banking credentials

  • Records everything from keystrokes to screen activity

  • Activates the camera and microphone remotely

  • Tracks GPS location in real time

  • Hijacks the default SMS app to grab verification codes

  • Uses Tor and Websockets for covert remote control, letting attackers send texts, place calls, uninstall apps, or even wipe themselves to cover tracks

Bitdefender says their researchers documented more than 130 commands supported by the malware.

A Broader Operation

The use of fake TradingView ads may just be the latest phase. According to Bitdefender, earlier waves of the same campaign targeted Windows users with Facebook ads impersonating dozens of well-known brands. This shows the operators behind Brokewell are testing multiple entry points across platforms.

The Android campaign, however, seems laser-focused on cryptocurrency holders. By grabbing wallet addresses, intercepting SMS codes, and recording every screen, attackers position themselves to drain digital assets in one swoop.

Growing Risk for Crypto Investors

The attack highlights a rising trend: crypto investors remain prime targets for cybercrime. Just this summer, FBI alerts warned of malware hidden in fake trading apps. With billions locked in digital assets and mobile phones often acting as the key, scams like this are expected to escalate.

For Meta, it’s another black eye. The company has already faced criticism over malicious ads on Facebook and Instagram. Despite policies banning them, sophisticated campaigns keep slipping through.

Security analysts warn the fake TradingView scheme shows how easy it is for criminals to exploit trust in well-known financial tools. As one Bitdefender researcher put it, “If they can turn TradingView into bait, they can do it with any major app.”

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

TRENDING