If you have this app on your phone, be careful: Your bank account may be emptied.

If you have this app on your phone, be careful: Your bank account may be emptied.

11.10.2025 12:29

A fake Android application spreading under the name 'Mobdro Pro IP TV + VPN' has been found to empty users' bank accounts. According to a report by Cleafy, the presence of Turkish phrases in the software's code, which has affected more than 3,000 devices, has raised claims that the attack may have originated from Turkey.

Cybersecurity researchers have announced that a fake Android application spreading under the name 'Mobdro Pro IP TV + VPN' targets users' bank accounts. It is claimed that the fraud has affected more than 3,000 devices across Europe, with connections to Turkey.

INFILTRATING DEVICES WITH PROMISE OF FREE BROADCASTING

According to a report published by the fraud detection firm Cleafy, the fake application claims to offer users free movies, series, and sports broadcasts, leading to its installation on devices. However, the application actually hosts an advanced malware called 'Klopatra'. This malware completely takes over remote control of the device and can perform banking transactions on behalf of the user.

READING SCREEN AND PERFORMING BANKING TRANSACTIONS

According to the report, attackers can read the screen content and perform actions on the device by using Android's accessibility services. This method is considered an increasingly common technique in modern banking fraud.

MORE THAN 3,000 DEVICES AFFECTED

According to Cleafy data, more than 3,000 Android devices across Europe have been affected by this malware. Experts have warned that similar fake applications may spread under different names.

DETAILS FROM TURKEY CAUGHT ATTENTION

According to a report by Euronews, the Turkish phrases and infrastructure traces found in the software's code suggest that the attack may have originated from Turkey. It was detected that Turkish function names such as "ArkaUcKomutIsleyicisi" are present in the code, and terms like "Etiket", "Eavori_durumu", and "Bot_notu" were found in the JSON data coming from control servers. Researchers stated that these expressions were directly written by the attackers, indicating that they are traces left by human hands.

In order to provide you with a better service, we position cookies on our site. Your personal data is collected and processed within the scope of KVKK and GDPR. For detailed information, you can review our Data Policy / Disclosure Text. By using our site, you agree to our use of cookies.', '