In recent months, cybersecurity researchers have raised a red flag: cybercriminals are using fake ads on Meta (Facebook and Instagram) to distribute a malware strain called Brokewell, disguised as the TradingView Premium app for Android.
The goal is clear: to steal cryptocurrencies, sensitive data, and even gain remote control over your device. If your business, personal finances, or investments rely on your smartphone, you need to understand how this threat works—and how to protect yourself. At TecnetOne, we break it down for you.
You've likely heard of TradingView, one of the most widely used platforms in the financial world for chart analysis, trading, and crypto tracking. Its premium version is paid, so the promise of getting it for free is extremely tempting.
That’s exactly what attackers exploit: since July 2024, they’ve placed over 75 fake ads on Meta promoting a free download of this “premium” version. But the download link doesn’t point to Google Play or any official app store—it leads to cloned pages that prompt users to download a trojanized .apk file.
That file hides Brokewell, a far more sophisticated malware than it appears to be.
Once installed, the fake app initiates a step-by-step manipulation process:
This lets the malware control critical functions of your phone unnoticed.
Trickery to make you believe you're applying a legitimate update.
By getting this, attackers gain direct access to your device.
Brokewell stays active and invisible—ready to spy, steal, and manipulate.
This isn’t just another credential-stealing app—Brokewell is an advanced spyware and Remote Access Trojan (RAT) with a huge arsenal of features.
Once inside, Brokewell can essentially turn your phone into a spy camera controlled by criminals. Its most dangerous capabilities include:
In short: your phone stops being yours.
Similar titles: New Android Malware Disguises Itself as Russian FSB Antivirus
According to Bitdefender, this is one of the most advanced mobile malvertising attacks ever observed. Here’s why:
If you’re an Android user, pay close attention. Here are TecnetOne’s recommendations:
Learn more: The Evolution of Artificial Intelligence Driven Malware
These attacks aren’t limited to curious individuals—they pose a serious risk to businesses and professionals who rely on mobile devices for:
If an employee installs a malicious app:
With businesses increasingly relying on mobile apps, the threat is bigger than ever.
This isn’t an isolated incident—it’s a sign of what’s coming:
If you downloaded a suspicious app and notice odd behavior (apps crashing, high data usage, mic or camera turning on unexpectedly), take these steps immediately:
At TecnetOne, we believe prevention is always your best defense. Stay alert, keep your systems updated, and never underestimate the creativity of cybercriminals.
And if your company ever suffers a mobile security breach, remember: our incident response team is ready to help you contain, investigate, and recover—fast.
Let me know if you'd like an SEO title and meta description for this piece.