Skip to main content
Skip to main content
3 entries found.
Updated on Jul 16, 2021

Trojan:AndroidOS/Multiverze identifies a versatile family of malware that, despite its Android-focused naming, presents significant risks to Windows and Linux devices. Its operation hinges on exploiting common programming runtimes and server vulnerabilities, creating a blended threat landscape. Security teams note frequent detections involving Java archive files on desktops and Go-language binaries on servers under this same signature. This analysis details the malware's technical mechanisms, its infection lifecycle, and practical steps for response and prevention. 

The core threat is a backdoor designed for persistent remote control and data theft. Threat actors deliver it through sophisticated methods, including exploiting critical vulnerabilities in web frameworks like React/Next.js or bundling it within modified application packages. Following a breach, Multiverze establishes a foothold that allows threat actors to deploy high-capacity attack tools such as Sliver or CobaltStrike beacons. Its cross-platform nature is key to its effectiveness; it leverages Java bytecode's portability and Go's compilation features to target multiple operating systems from a shared codebase. The ultimate impact ranges from single-device compromise to full network infiltration, as it often includes functionality for network proxying and lateral movement. 

Alert level: severe
Updated on Sep 15, 2023

Trojan:AndroidOS/Multiverze!pz identifies a versatile family of malware that, despite its Android-focused naming, presents significant risks to Windows and Linux devices. Its operation hinges on exploiting common programming runtimes and server vulnerabilities, creating a blended threat landscape. Security teams note frequent detections involving Java archive files on desktops and Go-language binaries on servers under this same signature. This analysis details the malware's technical mechanisms, its infection lifecycle, and practical steps for response and prevention. 

The core threat is a backdoor designed for persistent remote control and data theft. Threat actors deliver it through sophisticated methods, including exploiting critical vulnerabilities in web frameworks like React/Next.js or bundling it within modified application packages. Following a breach, Multiverze establishes a foothold that allows threat actors to deploy high-capacity attack tools such as Sliver or CobaltStrike beacons. Its cross-platform nature is key to its effectiveness; it leverages Java bytecode's portability and Go's compilation features to target multiple operating systems from a shared codebase. The ultimate impact ranges from single-device compromise to full network infiltration, as it often includes functionality for network proxying and lateral movement. 

Alert level: severe
Updated on Jul 25, 2025

Trojan:AndroidOS/Multiverze!MTB identifies a versatile family of malware that, despite its Android-focused naming, presents significant risks to Windows and Linux devices. Its operation hinges on exploiting common programming runtimes and server vulnerabilities, creating a blended threat landscape. Security teams note frequent detections involving Java archive files on desktops and Go-language binaries on servers under this same signature. This analysis details the malware's technical mechanisms, its infection lifecycle, and practical steps for response and prevention. 

The core threat is a backdoor designed for persistent remote control and data theft. Threat actors deliver it through sophisticated methods, including exploiting critical vulnerabilities in web frameworks like React/Next.js or bundling it within modified application packages. Following a breach, Multiverze establishes a foothold that allows threat actors to deploy high-capacity attack tools such as Sliver or CobaltStrike beacons. Its cross-platform nature is key to its effectiveness; it leverages Java bytecode's portability and Go's compilation features to target multiple operating systems from a shared codebase. The ultimate impact ranges from single-device compromise to full network infiltration, as it often includes functionality for network proxying and lateral movement. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the "Multiverze" family. 

Alert level: severe