In recent months, cybersecurity researchers have raised a red flag: cybercriminals are using fake ads on Meta (Facebook and Instagram) to distribute a malware strain called Brokewell, disguised as the TradingView Premium app for Android.
The goal is clear: to steal cryptocurrencies, sensitive data, and even gain remote control over your device. If your business, personal finances, or investments rely on your smartphone, you need to understand how this threat works—and how to protect yourself. At TecnetOne, we break it down for you.
The Bait: Free TradingView Premium
You've likely heard of TradingView, one of the most widely used platforms in the financial world for chart analysis, trading, and crypto tracking. Its premium version is paid, so the promise of getting it for free is extremely tempting.
That’s exactly what attackers exploit: since July 2024, they’ve placed over 75 fake ads on Meta promoting a free download of this “premium” version. But the download link doesn’t point to Google Play or any official app store—it leads to cloned pages that prompt users to download a trojanized .apk file.
That file hides Brokewell, a far more sophisticated malware than it appears to be.
What Happens When You Install the Fake App?
Once installed, the fake app initiates a step-by-step manipulation process:
Requests accessibility permissions
This lets the malware control critical functions of your phone unnoticed.
Displays fake update windows
Trickery to make you believe you're applying a legitimate update.
Asks for your lock screen PIN
By getting this, attackers gain direct access to your device.
Runs in the background undetected
Brokewell stays active and invisible—ready to spy, steal, and manipulate.
This isn’t just another credential-stealing app—Brokewell is an advanced spyware and Remote Access Trojan (RAT) with a huge arsenal of features.
What Brokewell Can Do on Your Phone
Once inside, Brokewell can essentially turn your phone into a spy camera controlled by criminals. Its most dangerous capabilities include:
- Cryptocurrency theft
It scans wallets like Bitcoin, Ethereum, Tether, and even traditional bank apps.
- 2FA code theft
It can extract codes from apps like Google Authenticator, bypassing extra layers of protection.
- Keylogging
Captures everything you type, including passwords and private messages.
- Camera and microphone access
It can spy on you without your knowledge.
- Real-time location tracking
Attackers always know where you are.
- SMS and call interception
Useful for stealing bank messages or suppressing security alerts.
- Full remote control
Via the Tor network and WebSockets, attackers can command your device as if it were in their hands.
In short: your phone stops being yours.
Similar titles: New Android Malware Disguises Itself as Russian FSB Antivirus
Why This Campaign Is So Dangerous
According to Bitdefender, this is one of the most advanced mobile malvertising attacks ever observed. Here’s why:
- No fake base station needed
Brokewell works without relying on external hardware—just one wrong download is enough.
- Perfect disguise
The ads and cloned websites look nearly identical to the real thing, often with fake reviews to convince users.
- Targeting European users
The attack is designed to scale across the EU, where crypto and trading apps are on the rise.
- Beyond financial theft
Brokewell also hijacks your digital identity: emails, cookies, photos, documents, social media access—everything.
How to Spot and Avoid the Trap
If you’re an Android user, pay close attention. Here are TecnetOne’s recommendations:
- Always download from official stores
Google Play may not be perfect, but it’s far safer than unknown APK downloads.
- Be skeptical of “free premium” offers
Suspicious links or glowing reviews often indicate a scam.
- Check URLs carefully
Attackers often use lookalike domains to deceive you.
- Review app permissions
If a trading app wants SMS, mic, or accessibility access—it’s a red flag.
- Use mobile security solutions
A good antivirus or security suite can detect anomalies early.
- Keep your backups updated
If something goes wrong, backups are your recovery lifeline.
Learn more: The Evolution of Artificial Intelligence Driven Malware
Impact on Businesses and Crypto Users
These attacks aren’t limited to curious individuals—they pose a serious risk to businesses and professionals who rely on mobile devices for:
- Managing financial operations
- Accessing corporate accounts
- Internal communication
If an employee installs a malicious app:
- Confidential contracts or client data could be exposed
- Corporate crypto wallets may be drained
- Real credentials could be used for internal phishing campaigns
With businesses increasingly relying on mobile apps, the threat is bigger than ever.
Brokewell and the Future of Mobile Attacks
This isn’t an isolated incident—it’s a sign of what’s coming:
- Malware-as-a-Service (MaaS):
Criminals are selling these kits to less experienced attackers.
- Generative AI for realistic campaigns:
Algorithms create fake ads that perfectly mimic real brand styles.
- Double extortion tactics:
First, they steal—then they encrypt—pressuring victims on both fronts.
- Mobile-first focus:
Smartphones now store your crypto, credentials, and communications—making them prime targets.
What to Do If You Suspect You’re a Victim
If you downloaded a suspicious app and notice odd behavior (apps crashing, high data usage, mic or camera turning on unexpectedly), take these steps immediately:
- Disconnect the device from the internet
- Run a full scan with a mobile security solution
- Change your passwords from a secure device
- Alert your IT team if it's a work device
- Consider restoring the phone to factory settings if issues persist
Final Thoughts
At TecnetOne, we believe prevention is always your best defense. Stay alert, keep your systems updated, and never underestimate the creativity of cybercriminals.
And if your company ever suffers a mobile security breach, remember: our incident response team is ready to help you contain, investigate, and recover—fast.
Let me know if you'd like an SEO title and meta description for this piece.