BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Malware Roundup: 651 Cybercriminals Arrested, New Android Banking Trojan, Critical CCTV Flaw

Malware Roundup: 651 Cybercriminals Arrested, New Android Banking Trojan, Critical CCTV Flaw

February 19, 2026Malware & Threats3 min readcritical

Originally reported by BleepingComputer, Graham Cluley, Malwarebytes Labs, SecureList (Kaspersky)

#malware#banking-trojan#android#cybercrime-arrests#cctv-vulnerability#data-breach#infostealer#cisa-advisory
Share

TL;DR

Major cybercrime arrests across Africa, new Android banking malware targeting Europe, critical CCTV vulnerabilities, and emerging infostealer campaigns dominate this week's threat landscape.

Why critical?

CISA issued an advisory about a critical authentication bypass vulnerability in Honeywell CCTV systems used in critical infrastructure, warranting immediate attention.

African Authorities Dismantle Cybercrime Networks

African law enforcement agencies executed a coordinated operation resulting in the arrest of 651 suspects involved in various cybercrime schemes. According to BleepingComputer, the joint operation specifically targeted investment fraud, mobile money scams, and fraudulent loan applications. Authorities recovered over $4.3 million during the crackdown, demonstrating the significant financial impact of these criminal networks.

The operation highlights the growing coordination between African nations in combating cybercrime, particularly schemes that exploit mobile financial services popular across the continent.

Massiv Banking Trojan Targets Southern Europe

Security researchers have identified a new Android banking malware dubbed "Massiv" actively distributing across southern Europe. BleepingComputer reports the trojan disguises itself as an IPTV streaming application to deceive victims into installation.

The malware follows established banking trojan tactics, likely targeting financial credentials and two-factor authentication tokens. Organizations should ensure mobile device management policies include warnings about sideloaded applications and unofficial app stores.

CISA Warns of Critical Honeywell CCTV Vulnerability

The Cybersecurity and Infrastructure Security Agency issued an advisory regarding a critical authentication bypass vulnerability affecting multiple Honeywell CCTV products. BleepingComputer reports the flaw enables unauthorized access to video feeds and potential account takeover.

Given these systems' deployment in critical infrastructure environments, the vulnerability presents significant security risks. Organizations using affected Honeywell CCTV systems should immediately review the CISA advisory and implement recommended mitigations.

Kaspersky Analyzes Arkanix Stealer Campaign

Kaspersky researchers published analysis of the "Arkanix Stealer" malware, a dual-language infostealer built using both C++ and Python components. According to SecureList, the malware operated for several months as a malware-as-a-service offering, complete with a referral program for distributors.

The stealer targeted a wide range of data types, indicating sophisticated data collection capabilities. The MaaS model demonstrates the continued commercialization of cybercrime tools, lowering barriers for threat actors to launch credential theft campaigns.

Tenga Data Breach via Employee Phishing

Intimate products manufacturer Tenga disclosed a security incident affecting US customer data following a successful phishing attack against an employee. Malwarebytes Labs reports the breach potentially exposed customer information, creating risks for targeted sextortion campaigns.

Customers should remain vigilant for follow-up phishing attempts that leverage the sensitive nature of the compromised data. The incident underscores how threat actors target employees of companies handling sensitive personal information.

Additional Security Notes

Security podcast coverage this week examined Meta's facial recognition capabilities in smart glasses and potential internet infrastructure dependencies. Meanwhile, Meta filed patents for AI systems that could continue social media posting after death, raising privacy and digital estate questions.

Sources

  • https://www.bleepingcomputer.com/news/security/police-arrests-651-suspects-in-african-cybercrime-crackdown/
  • https://www.bleepingcomputer.com/news/security/new-massiv-android-banking-malware-poses-as-an-iptv-app/
  • https://www.bleepingcomputer.com/news/security/critical-infra-honeywell-cctvs-vulnerable-to-auth-bypass-flaw/
  • https://grahamcluley.com/smashing-security-podcast-455/
  • https://www.malwarebytes.com/blog/news/2026/02/intimate-products-producer-tenga-spilled-customer-data
  • https://www.malwarebytes.com/blog/ai/2026/02/meta-patents-ai-that-could-keep-you-posting-from-beyond-the-grave
  • https://securelist.com/arkanix-stealer/119006/

Originally reported by BleepingComputer, Graham Cluley, Malwarebytes Labs, SecureList (Kaspersky)

Tags

#malware#banking-trojan#android#cybercrime-arrests#cctv-vulnerability#data-breach#infostealer#cisa-advisory

Tracked Companies

🇺🇸Meta Platforms

Related Intelligence

  • Threat Roundup: Zero-Days, Data Breaches, and Evolving Attack Vectors

    criticalFeb 17, 2026
  • Threat Intelligence Digest: Chinese APT Campaign, Critical Router RCE, and Agent Tesla Resurgence

    highFeb 26, 2026
  • Critical Infrastructure Under Siege: From Actively Exploited BeyondTrust RCE to Healthcare Ransomware Shutdowns

    criticalFeb 20, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Vulnerability Intelligence: AI Exploit Acceleration, Android Banking Trojans, and Mass CVE Disclosures

Next Article

AI Agent Autonomously Publishes Malicious Hit Piece After Code Rejection →