Discovery Date: March 2025
Threat Group: Unknown (Three suspects arrested)
Victims: Android mobile banking users across Russia and potentially abroad
Malware Type: Mamont (Banking Trojan)
Delivery Method: Telegram, disguised mobile apps, fake video files, fraudulent e-commerce links
Primary Objective: Unauthorized banking transactions via SMS services and data exfiltration
In a rare but notable law enforcement move, Russian authorities have taken down what appears to be a prolific cybercrime operation centered around Mamont—a recently identified banking trojan responsible for defrauding hundreds of mobile banking users. Three suspects, arrested in the Saratov region, are now facing charges for developing and operating the Android-targeting malware.
Video footage released by Russia’s Ministry of Internal Affairs (MVD) shows the suspects being detained in a high-profile bust, handcuffed and escorted by armed officers. The arrests reportedly follow a long-term investigation linking the malware operation to over 300 separate incidents of cybercrime, although the real number could be significantly higher.
How Mamont Malware Works:
The Mamont trojan is specifically engineered to exploit Android devices by masquerading as common applications or enticing video files, most commonly distributed through Telegram channels. Its infection vectors include:
- Fake video lures labeled with phrases like “Is this you in the video?”
- Impersonated apps resembling banking, courier, or media apps
- Fraudulent e-commerce sites offering suspiciously cheap goods, often used to bait users into downloading “order tracking” apps
Once installed, Mamont silently gains control over SMS banking services, enabling attackers to:
- Transfer funds out of the victim’s account via SMS commands
- Harvest sensitive SMS content including transaction alerts and verification codes
- Exfiltrate device information and forward it to the attackers’ Telegram-controlled backend
- Hijack messaging contacts, sending infected links to others in the victim’s network
This multi-functional behavior allows the malware to act as both a data siphon and a worm-like propagation tool, creating viral spreads across Telegram’s loosely monitored ecosystem.
Fake Storefront Scheme:
In one of their more elaborate ploys, the Mamont operators created a fake online storefront offering goods at too-good-to-be-true prices. Once the victim placed an order, a malicious APK file posing as an order tracker was sent via Telegram, often accompanied by direct, personalized messages to encourage installation. The moment the app was opened, Mamont embedded itself deep into the phone, enabling remote theft of funds and personal data.
Psychological Tactics and Voice Spoofing:
Law enforcement reports and lawmakers in Russia highlight that the criminals often called victims directly, impersonating:
- Police officers
- Postal service employees
- Hospital staff
- Other social authority figures
During these calls, they would manipulate the victim into reading or forwarding SMS-based authentication codes, often by generating a sense of urgency or fear. This aligns with a growing trend of “deep con” fraud, where social engineering is layered onto technical exploits.
Legislative Pushback:
Reacting to this wave of SMS-based fraud, the Russian Duma has begun drafting a bill that aims to delay or block SMS delivery during active phone calls. If passed, this law would prevent criminals from tricking victims into reading codes while still on the line. The proposal reflects increasing concern from governments about the intersection of mobile communications and financial vulnerability.
What Was Seized:
Authorities confiscated a substantial collection of tools during the operation, including:
- Personal computers and laptops
- Hard drives and USB storage devices
- Mobile phones and SIM cards
- Dozens of bank cards and cryptocurrency wallet information
- Communication equipment believed to be used for Telegram account rotation
The investigation is ongoing, and authorities have not ruled out international connections or the existence of additional suspects or collaborators.
Larger Implications:
While most countries remain focused on high-profile ransomware gangs, Mamont reveals the ongoing threat from mobile-targeting malware, particularly in regions where SMS banking remains dominant. Telegram’s role as a distribution platform also underscores the challenges in policing private, encrypted chat ecosystems that double as black-market toolkits.
If anything, the Mamont case is a sobering reminder:
Cybercrime is no longer restricted to dark web forums and anonymous Bitcoin wallets—it’s happening in everyday apps, in plain sight.
Takeaway:
This isn’t just a technical problem. It’s a behavioral war exploiting the gaps between law, technology, and trust. The Mamont malware operation shows how malware creators can thrive on common social habits and systemic weaknesses in digital communication.
The truth is simple and unsettling:
Most people don’t realize their phone is the weakest link in their financial life—until it’s too late.

🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
Help us bring real change! Corporate lobbying has corrupted our system for too long, and it’s time to take action. Please sign and share this petition—your support is crucial in restoring accountability to our government. Every signature counts! Thank you!
https://www.ipetitions.com/petition/restore-our-republic-end-lobbying

Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a


