Connect with us

Hi, what are you looking for?

Top Stories

Hugging Face Misused to Distribute Android Trojan TrustBastion, Warns Bitdefender

Bitdefender reveals that cybercriminals exploit Hugging Face to distribute the TrustBastion Android Trojan, compromising user credentials and device access.

Bitdefender has reported that cybercriminals are exploiting Hugging Face as a distribution point for Android malware in a campaign aimed at gaining unauthorized access to devices, credentials, and lock screen information. This activity is associated with a remote access trojan campaign that initiates with a malicious Android application named TrustBastion. According to Bitdefender, the perpetrators have employed social engineering tactics, repeated malware builds, and Android accessibility services throughout the infection chain.

Hugging Face, known for its hosting of machine learning models and datasets, serves a diverse community of developers and researchers across the Asia-Pacific region, including institutions such as the University of Sydney. However, Bitdefender’s findings indicate that the platform’s content controls failed to prevent the hosting of malicious software during this campaign. Hugging Face has stated that it utilizes ClamAV, an open-source antivirus engine, to scan uploads.

Bitdefender outlined a two-stage infection process. The initial stage involves a dropper application, while the second stage installs a malicious payload that enables remote access trojan capabilities. The infection process begins when a user downloads TrustBastion, typically triggered by an advertisement or prompt that falsely claims the device is infected and recommends the installation of a security application.

When TrustBastion’s associated website was active, it claimed that the app could detect scam and fraudulent SMS messages, as well as phishing and malware. Importantly, Bitdefender noted that TrustBastion exhibited no overtly harmful functionality upon initial installation. Following installation, the app prompts users to perform an update, using visuals that mimic legitimate Google Play and Android system update dialogues.

According to Bitdefender, the dropper then initiates a network request to an encrypted endpoint on trustbastion[.]com. Instead of directly delivering an Android package file, the server responds with an HTML page that contains a redirect link to a Hugging Face repository hosting the malware payload. Analysis of captured network traffic revealed that the final APK was downloaded directly from Hugging Face datasets.

Researchers indicated that attackers frequently utilize established domains for malware distribution, as traffic from low-trust domains is generally flagged by security systems more quickly. By leveraging Hugging Face’s hosting capabilities, the campaign sought to enhance its effectiveness.

Bitdefender also highlighted the campaign’s reliance on rapid payload changes. The research indicated a form of server-side polymorphism, with new payloads being generated approximately every 15 minutes. The analyzed Hugging Face repository exhibited a high volume of commits, with more than 6,000 updates documented within a span of about 29 days. Following the investigation, the repository was taken offline, only for the activity to resume under a different link with minor cosmetic changes while maintaining the underlying code.

Upon installation, the second-stage payload requests various permissions, presenting itself as a legitimate system component under the guise of a “Phone Security” feature. Bitdefender noted that the malware guides users through enabling Accessibility Services, framing the request as part of a necessary security or verification step. This stage also seeks permissions for screen recording, screen casting, and overlay display, enabling the malware to observe and manipulate on-screen content.

Once the necessary permissions are granted, the remote access trojan can monitor user activity and capture screen content, subsequently exfiltrating data to a command-and-control server. The malware is designed to show fraudulent authentication interfaces, attempting to collect user credentials by impersonating financial services such as Alipay and WeChat. Additionally, it can capture lock screen information and authentication inputs.

Bitdefender identified persistent communication between the malware and a command-and-control server, which used keep-alive connections. Their investigation uncovered a command-and-control endpoint linked to the IP address 154.198.48.57 on port 5000, associated with the trustbastion[.]com domain. This infrastructure served multiple functions, including delivering the payload URL, loading web views to imitate legitimate features, transmitting stolen data, and providing configuration updates.

The findings come at a time when Hugging Face is facing intensified scrutiny in Australia due to concerns over the content it hosts. Australia’s eSafety Commissioner has mandated that Hugging Face modify its terms to ensure account holders take steps to mitigate the risk of uploaded models being misused for generating child sexual exploitation or pro-terror material. The regulator has the authority to impose fines of up to $49.5 million for breaches of these terms.

Bitdefender’s researchers noted, “Unfortunately, the space Hugging Face offers can also be used by cybercriminals for malicious purposes as the platform doesn’t seem to have meaningful filters that govern what people can upload.” The security firm anticipates that attackers will continue to leverage reputable hosting services and regularly modify their payloads to diminish detection rates.

See also
Staff
Written By

The AiPressa Staff team brings you comprehensive coverage of the artificial intelligence industry, including breaking news, research developments, business trends, and policy updates. Our mission is to keep you informed about the rapidly evolving world of AI technology.

You May Also Like

Top Stories

Nvidia enters South Korea's AI market by launching 7 million Korean-language personas and the multimodal Nemotron3 Nano, aiming to establish market dominance.

Top Stories

Multiverse Computing unveils the LittleLamb AI model family on Hugging Face, reducing model size by 50% while enhancing performance for edge and mobile applications.

Top Stories

DeepSeek's V4-Pro eclipses GPT-5 and Claude in key benchmarks, achieving a Codeforces rating of 3,206 while undercutting OpenAI's costs by 89% per million tokens.

Top Stories

Hugging Face launches ML Intern, an open-source AI agent that surpasses Claude Code in scientific reasoning with a 32% GPQA score, offering $1,000 in...

Top Stories

Anonymous developer RizenML claims to have trained a 235M parameter language model on a single Nvidia RTX 5080 in 14 days, challenging traditional AI...

AI Technology

Microsoft AI CEO Mustafa Suleyman claims most white-collar tasks will be automated within 18 months, prompting urgent updates to legal education at the University...

Top Stories

Threat actors exploit the Marimo Python notebook vulnerability (CVE-2026-39987) to deploy NKAbuse malware via Hugging Face, launching 662 attacks in just three days.

Top Stories

Hugging Face's HoloTab Chrome extension enables AI models to mimic human behavior in web applications, enhancing automation without site-specific integrations.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.