Connect with us

Technology

Android malware hidden in fake antivirus app

Published

on

Android malware hidden in fake antivirus app

NEWYou can now listen to Fox News articles!

If you use an Android phone, this deserves your attention. 

Cybersecurity researchers warn that hackers are using Hugging Face, a popular platform for sharing artificial intelligence (AI) tools, to spread dangerous Android malware. 

At first, the threat appears harmless because it is disguised as a fake antivirus app. Then, once you install it, criminals gain direct access to your device. Because of this, the threat stands out as especially troubling. It combines two things people already trust — security apps and AI platforms.

Sign up for my FREE CyberGuy Report

Advertisement

Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

MALICIOUS GOOGLE CHROME EXTENSIONS HIJACK ACCOUNTS

Researchers say hackers hid Android malware inside a fake antivirus app that looked legitimate at first glance.  (Kurt “CyberGuy” Knutsson)

What Hugging Face is and why it matters

For anyone unfamiliar, Hugging Face is an open platform where developers share AI, NLP and machine learning models. It is widely used by researchers and startups and has become a central hub for AI experimentation. That openness is also what attackers exploited. Because Hugging Face allows public repositories and supports many file types, criminals were able to host malicious code in plain sight.

The fake antivirus app behind the attack

The malware first appeared in an Android app called TrustBastion. On the surface, it looks like a helpful security tool. It promises virus protection, phishing defense and malware blocking. In reality, it does the opposite. 

Advertisement

Once installed, TrustBastion immediately claims your phone is infected. It then pressures you to install an update. That update delivers the malicious code. This tactic is known as scareware. It relies on panic and urgency to push users into tapping before thinking.

FAKE ERROR POPUPS ARE SPREADING MALWARE FAST

The fake TrustBastion app mimics a legitimate Google Play update screen to trick users into installing malware.  (Bitdefender)

How the malware spreads and adapts

According to Bitdefender, a global cybersecurity company, the campaign centers on a fake Android security app called TrustBastion. Victims were likely shown ads or warnings claiming their device was infected and were instructed to manually install the app.

The attackers hosted TrustBastion’s APK files directly on Hugging Face, placing them inside public datasets that appeared legitimate at first glance. Once installed, the app immediately prompted users to install a required “update,” which delivered the actual malware.

Advertisement

After researchers reported the malicious repository, it was taken down. However, Bitdefender observed that nearly identical repositories quickly reappeared, with small cosmetic changes but the same malicious behavior. That rapid re-creation made the campaign harder to fully shut down.

What this Android malware can actually do

This Trojan is not minor or annoying. It is invasive. Bitdefender says the malware can:

Take screenshots of your device

Show fake login screens for financial services

Capture your lock screen PIN

Advertisement

Once collected, that data is sent to a third-party server. From there, attackers can move quickly to drain accounts or lock you out of your own phone.

What Google says about the threat

Google says users who stick to official app stores are protected. A Google spokesperson told CyberGuy, “Based on our current detection, no apps containing this malware are found on Google Play.

“Android users are automatically protected against known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services.

“Google Play Protect can warn users or block apps known to exhibit malicious behavior, even when those apps come from sources outside of Play.”

BROWSER EXTENSION MALWARE INFECTED 8.8M USERS IN DARKSPECTRE ATTACK

Advertisement

Once installed, the malware could capture screenshots, fake login details and even your lock screen PIN. (Kurt “CyberGuy” Knutsson)

How to stay safe from Hugging Face Android malware

This threat is a reminder that small choices matter. Here is what you should do right now:

1) Stick to trusted app stores

Only download apps from reputable sources like Google Play Store or the Samsung Galaxy Store. These platforms have moderation and scanning in place.

2) Read reviews before installing

Look closely at ratings, download counts and recent comments. Fake security apps often have vague reviews or sudden rating spikes.

3) Use a data removal service

Even careful users can have personal data exposed. A data removal service helps remove your phone number, email and other details from data broker sites that criminals rely on. That reduces follow-up scams, fake security alerts and account takeover attempts.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. 

These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

4) Run Play Protect and use strong antivirus software

Scan your device regularly with Play Protect and back it up with strong antivirus software for added protection. Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it hasn’t been 100% effective at removing all known malware from Android devices.

Advertisement

The best way to protect yourself against malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also help you detect phishing emails and ransomware, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com

5) Avoid sideloading APK files

Avoid installing apps from websites outside the app store. These apps bypass security checks, so always verify the publisher name and URL.

6) Lock down your Google account

Your phone security depends on it. Enable two-step verification (2FA) first, then use a strong, unique password stored in a password manager to prevent account takeovers.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Advertisement

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

7) Be cautious with permissions

Be cautious with accessibility permissions. Malware often abuses them to take control of your device.

8) Watch app updates closely

Malware can hide inside fake updates. Be cautious of urgent fixes that push you outside the app store.

Kurt’s key takeaways

This attack shows how quickly trust can be weaponized. A platform designed to advance AI research was repurposed as a delivery system for malware. A fake antivirus app became the threat it claimed to stop. Staying safe no longer means avoiding sketchy-looking apps. It means questioning even those apps that appear helpful and professional.

Have you seen something on your phone that made you question its security? Let us know your thoughts by writing to us at Cyberguy.com

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 

Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Nothing’s noise-canceling CMF Buds 2A are down to just $19.99 just for today

Published

on

Nothing’s noise-canceling CMF Buds 2A are down to just .99 just for today

It’s not every day you find a decent pair of wireless earbuds with active noise cancellation, a transparency mode, and app support for less than $20, which is why the current lighting deal on the CMF Buds 2A stands out. Now through 11:15PM ET today, April 7th, Nothing’s budget earbuds are available on Amazon in all three colors for just $19.99 ($29 off), which matches their lowest price to date.

For the price, the Buds 2A cover the basics and then some. They deliver decent (albeit a little tinny) sound and 42 decibels of noise cancellation, along with an IP54 rating and a useful transparency mode for staying aware of your surroundings. They also provide a commendable eight hours of battery life per charge with ANC disabled — or up to 35.5 with the included charging case — and feature four onboard mics that leverage Nothing’s noise reduction tech, which helps boost voice call quality. I wouldn’t say voice clarity is their strong suit, though, again, they’re a $20 pair of earbuds.

Like the rest of Nothing’s entry-level earbuds, the 2A also work with the Nothing X app, adding a level of flexibility that’s hard to find at this price. With the app, you can tweak EQ settings, adjust the bass response, switch between ANC modes, or quickly enable multi-device pairing. There’s even a “find my earbuds” feature if you lose them, and you can assign a gesture to trigger your phone’s virtual assistant on the fly, whether that’s Siri or Google Assistant. On top of that, if you’re using a Nothing or CMF phone, you can use your voice to access ChatGPT directly through the earbuds.

Continue Reading

Technology

Healthcare data breach hits system storing patient records

Published

on

Healthcare data breach hits system storing patient records

NEWYou can now listen to Fox News articles!

Healthcare data breaches keep coming. Now, CareCloud is the latest to confirm a serious security incident.

The company says hackers accessed one of its systems that stores electronic health records, not confirmed patient records themselves. The intrusion lasted more than eight hours on March 16. That window matters because even a short breach can expose sensitive data at scale.

At this point, there is still uncertainty. CareCloud has not confirmed whether any data was taken or what specific information may be involved. However, the investigation is ongoing, and the company has brought in outside cybersecurity experts.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com –  trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Advertisement

HEALTH TECH BREACH EXPOSES 3.4M PATIENT RECORDS
 

A CareCloud security breach exposed a key healthcare system used by providers nationwide, raising new concerns about whether patient data may have been taken. (Nansan Houn/Getty Images)

What exactly happened inside CareCloud’s systems

CareCloud operates multiple environments where patient records are stored. According to its filing with the U.S. Securities and Exchange Commission, attackers gained access to one of those environments.

Here is what we know so far:

  • Unauthorized access began on March 16
  • Hackers stayed inside for more than eight hours
  • The company restored full system functionality and data access the same day
  • The company believes the attackers are no longer inside

CareCloud also says the incident was contained to that single environment and did not impact its other systems or platforms. Even so, the biggest unanswered question remains whether any data left the system. That detail matters because stolen health data often fuels identity theft, insurance fraud and targeted scams. 

Why healthcare data is such a valuable target

Healthcare companies sit on a goldmine of personal information. That includes names, Social Security numbers and medical histories. Unlike a credit card, you cannot simply cancel your medical history. We saw the scale of this risk during the Change Healthcare ransomware attack. That breach disrupted systems across the U.S. and delayed care for weeks. It also exposed just how interconnected the healthcare infrastructure has become. CareCloud serves more than 45,000 providers and supports millions of patients. That kind of reach makes any incident more serious. 

Advertisement

Where patient data may be stored

CareCloud has not shared full technical details yet. Public records suggest much of its infrastructure relies on Amazon Web Services. Cloud platforms are widely used across healthcare. They offer scale and flexibility. At the same time, they require strict security controls to prevent unauthorized access. It is still unclear how CareCloud separates or backs up data across its systems. That detail could affect how far attackers were able to move once inside. We reached out to CareCloud for a comment, but did not hear back before our deadline.

BANKING TECH DATA BREACH EXPOSES 672K IN RANSOMWARE ATTACK
 

The latest healthcare cyber incident puts CareCloud in the spotlight as investigators work to determine whether sensitive patient information left the system. (shapecharge/Getty Images)

What this means to you

Even if you have never heard of CareCloud, your doctor might use it. That is how these breaches work. A behind-the-scenes company gets compromised, and patients feel the impact later. Right now, there is no confirmation that patient data was stolen. Still, this is the moment to stay alert. If your information was involved, notifications could come weeks or even months later.

Ways to stay safe from healthcare data breaches

Healthcare breaches can feel out of your control. Still, a few simple habits can make a real difference.

Advertisement

1) Watch your medical statements closely

Check every explanation of benefits and billing statement you receive. Look for charges, prescriptions or visits you do not recognize. Even a small, unfamiliar charge can signal fraud. If something looks off, contact your insurer or provider right away.

2) Set up identity theft monitoring

Health data can be used to open accounts, file fake claims or commit identity theft. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. The faster you catch it, the easier it is to limit the damage. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com 

3) Consider data removal services

Your personal details often end up on data broker sites without your knowledge. That information can be used to target you after a breach. Removing your data from these sites with a data removal service reduces how much scammers can find and use against you. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

4) Use strong antivirus protection

If you receive emails about medical updates or billing issues, be extra careful. Malicious links and attachments are common after breaches. Strong antivirus software can help detect threats before you click and stop harmful downloads in real time. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

SSA IMPERSONATION SCAMS ARE GETTING MORE PERSONAL
 

Advertisement

CareCloud says hackers accessed one of its electronic health record environments for more than eight hours during a March 16 cyber incident now under investigation. (AndreyPopov/Getty Images)

5) Use strong, unique passwords

Secure your patient portals with a password you do not use anywhere else. Reusing passwords makes it easier for attackers to access multiple accounts. A password manager can generate and store strong passwords for you so you do not have to remember them. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

6) Enable two-factor authentication

Turn on two-factor authentication (2FA) if your provider offers it. This adds a second step, such as a code sent to your phone. Even if someone gets your password, this extra layer can stop them from getting into your account.

7) Be cautious with follow-up scams

After a breach, scammers often pose as healthcare providers or support teams. They may send emails, texts or even call you. Do not click links or share personal details unless you verify the source. When in doubt, go directly to your provider’s official website or call their listed number.

Kurt’s key takeaways

The CareCloud data breach is still unfolding. That uncertainty is part of the problem. Healthcare systems are complex. They rely on multiple vendors, cloud services and interconnected tools. That creates more entry points for attackers. Even when companies respond quickly, the ripple effects can last much longer.

Advertisement

If your most sensitive health data can pass through multiple companies you have never heard of, who should be responsible for keeping it safe? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com –  trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading

Technology

Gemini is making it faster for distressed users to reach mental health resources 

Published

on

Gemini is making it faster for distressed users to reach mental health resources 

Google says it has updated Gemini to better direct users to get mental health resources during moments of crisis. The change comes as the tech giant faces a wrongful death lawsuit alleging its chatbot “coached” a man to die by suicide, the latest in a string of lawsuits alleging tangible harm from AI products.

When a conversation indicates a user is in a potential crisis related to suicide or self-harm, Gemini already launches a “Help is available” module that directs users to mental health crisis resources, like a suicide hotline or crisis text line. Google says the update — really more of a redesign — will streamline this into a “one-touch” interface that will make it easier for users to get help quickly.

The help module also contains more empathetic responses designed “to encourage people to seek help,” Google says. Once activated, “the option to reach out for professional help will remain clearly available” for the remainder of the conversation.

Google says it engaged with clinical experts for the redesign and is committed to supporting users in crisis. It also announced $30 million in funding globally over the next three years “to help global hotlines.”

Like other leading chatbot providers, Google stressed that Gemini “is not a substitute for professional clinical care, therapy, or crisis support,” but acknowledged many people are using it for health information, including during moments of crisis.

Advertisement

The update comes amid broader scrutiny over how adequate the industry’s safeguards actually are. Reports and investigations, including our probe into the provision of crisis resources, frequently flag cases where chatbots fail vulnerable users, by helping them hide eating disorders or plan shootings. Google often fares better than many rivals in these tests, but is not perfect. Other AI companies, including OpenAI and Anthropic, have also taken steps to improve their detection and support of vulnerable users.

Continue Reading
Advertisement

Trending