Threat Intelligence

What active or emerging threats are targeting European banking in January 2026

European financial institutions face a new wave of sophisticated attacks: operator-controlled Android RATs, Hidden VNC fraud, and PhaaS campaigns bypassing MFA. Discover the Klopatra malware family, emerging stealers, and MITRE-mapped TTPs you need to defend against right now.

TLT
Threat Landscape Team
January 20, 20268 min read

Current threat intelligence indicates a significant surge in sophisticated, operator-driven mobile banking trojans and industrialized phishing ecosystems specifically targeting European financial institutions. A key emerging threat is the Klopatra Android RAT, which has demonstrated a high degree of technical evolution and focused regional targeting within Europe.

Primary Active Threats

The following table summarizes the most prominent malware families and services currently targeting European banking organizations:

Malware/Threat NameThreat Actor / OriginPrimary TargetsKey Characteristics
KlopatraTurkish-speaking GroupEuropean Banking AccountsUses Hidden VNC (HVNC), Accessibility abuse, and commercial-grade obfuscation (Virbox) to perform real-time, silent fraud.
Katz StealerUnknownItaly, Finland, ManufacturingInformation stealer often bundled with or related to PureLog Stealer; targets financial and administrative data.
EvilProxyPhaaS ProviderGlobal Banking / CryptoAdvanced phishing-as-a-service (PhaaS) that automates AJAX-looping to bypass MFA tokens in real time.
Cuckoo StealerUnknownBanking InstitutionsEmerging info-stealer targeting retail and financial credentials.
VMDetectLoaderUnknownBanking InstitutionsSpecialized loader designed to detect virtualized environments before delivering banking payloads.

Technical Analysis: Klopatra & Operator-Driven Fraud

Klopatra represents a shift toward "hands-on" fraudulent activity. Unlike traditional automated trojans, Klopatra is often operator-controlled, allowing attackers to bypass advanced fraud detection systems by mimicking legitimate user behavior.

MITRE ATT&CK Mapping for Klopatra:

TacticTechnique IDDescription
Initial AccessT1444Sideloading: Delivered via pirated IPTV droppers (e.g., Mobdro Pro IP TV + VPN) requesting REQUEST_INSTALL_PACKAGES.
PersistenceT1624Accessibility Service Abuse: Abuses Android Accessibility APIs to capture screens, inject gestures, and prevent app termination.
Defense EvasionT1406Obfuscation: Employs commercial-grade Virbox packing and native C/C++ libraries to hide core logic from Java-based analysis.
Credential AccessT1411Adversary-in-the-Middle (Overlays): Uses dynamic HTML overlays to harvest banking credentials and PINs.
Command & ControlT1219Remote Access Software (Hidden VNC): Enables a "black screen" mode while the device is charging at night to perform silent transactions via HVNC.

Vulnerability Landscape (CVEs)

While much of the banking fraud relies on social engineering and credential theft, the following CVEs have been highlighted in recent bulletins as relevant to the broader financial threat landscape:

CVE-2025-23280, CVE-2025-23330, CVE-2025-54252: These represent recently identified vulnerabilities often weaponized in delivery chains or infrastructure abuse to facilitate the persistence of financial malware.

Infrastructure Abuse: Threat actors are increasingly using legitimate services like AWS X-Ray for covert C2 and signed UEFI shells to achieve bootkit survival, ensuring long-term access to compromised financial workstations.

Affected European Jurisdictions

Intelligence reports explicitly mention targeted activity in the following European countries:

  • Italy: Target of Katz Stealer and PureLog Stealer campaigns.
  • Finland: Target of Katz Stealer and automated financial fraud campaigns.
  • Turkey: Identified as a primary hub for the development and operation of the Klopatra botnets, with artifacts indicating vertically integrated operations.

Ready to Transform Your Threat Intelligence?

See how Threat Landscape can reduce alert fatigue and improve your security operations