<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://www.threatfabric.com/blogs/hook-a-new-ermac-fork-with-rat-capabilities</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/stats-1.png</image:loc><image:caption>stats1</image:caption><image:title>stats1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/advertisement.png</image:loc><image:caption>advertisement</image:caption><image:title>advertisement</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/targets.png</image:loc><image:caption>targets</image:caption><image:title>targets</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/target_areas.png</image:loc><image:caption>targetareas</image:caption><image:title>targetareas</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/capabilities.png</image:loc><image:caption>capabilities</image:caption><image:title>capabilities</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/scratch.png</image:loc><image:caption>scratch</image:caption><image:title>scratch</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cover.png</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/rat.png</image:loc><image:caption>rat</image:caption><image:title>rat</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/forks.png</image:loc><image:caption>forks</image:caption><image:title>forks</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/the-malware-gap-why-fraud-security-controls-still-miss-mobile-malware</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202026-04-02%20at%2011.28.37.png</image:loc><image:caption>Screenshot20260402at112837</image:caption><image:title>Screenshot20260402at112837</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_MalwareGap4.jpg</image:loc><image:caption>TFMalwareGap4</image:caption><image:title>TFMalwareGap4</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202026-04-02%20at%2011.29.29.png</image:loc><image:caption>Screenshot20260402at112929</image:caption><image:title>Screenshot20260402at112929</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_MalwareGap5.jpg</image:loc><image:caption>TFMalwareGap5</image:caption><image:title>TFMalwareGap5</image:title></image:image><lastmod>2026-04-02</lastmod></url><url><loc>https://www.threatfabric.com/blogs/app-fraud-reimbursement-in-the-uk</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Best%20message%20to%20victims.png</image:loc><image:caption>Bestmessagetovictims</image:caption><image:title>Bestmessagetovictims</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Victims%20still%20get%20paid.png</image:loc><image:caption>Victimsstillgetpaid</image:caption><image:title>Victimsstillgetpaid</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/APP%20Fraud%20Reimbursement%20in%20the%20UK.png</image:loc><image:caption>APPFraudReimbursementintheUK</image:caption><image:title>APPFraudReimbursementintheUK</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Why%20woud%20fraudster%20not%20return%20for%20round%20two.png</image:loc><image:caption>Whywoudfraudsternotreturnforroundtwo</image:caption><image:title>Whywoudfraudsternotreturnforroundtwo</image:title></image:image><lastmod>2023-09-12</lastmod></url><url><loc>https://www.threatfabric.com/jobs/frontend-developer-vuejs</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-05-18</lastmod></url><url><loc>https://www.threatfabric.com/blogs/octo2-european-banks-already-under-attack-by-new-malware-variant</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Octo2.jpg</image:loc><image:caption>TFOcto2</image:caption><image:title>TFOcto2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide4-Sep-20-2024-10-23-20-9512-AM.png</image:loc><image:caption>Slide4Sep2020241023209512AM</image:caption><image:title>Slide4Sep2020241023209512AM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/octo_zombinder.png</image:loc><image:caption>octozombinder</image:caption><image:title>octozombinder</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide1-Sep-20-2024-10-16-01-2033-AM.png</image:loc><image:caption>Slide1Sep2020241016012033AM</image:caption><image:title>Slide1Sep2020241016012033AM</image:title></image:image><lastmod>2024-09-24</lastmod></url><url><loc>https://www.threatfabric.com/resources/mobile-banking-trojans-abuse-android-binaryxml-format-to-avoid-detection</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-08-24</lastmod></url><url><loc>https://www.threatfabric.com/blogs/new-android-malware-herodotus-mimics-human-behaviour-to-evade-detection</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/announcement.png</image:loc><image:caption>announcement</image:caption><image:title>announcement</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/capabilities-1.png</image:loc><image:caption>capabilities1</image:caption><image:title>capabilities1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/panel-1.png</image:loc><image:caption>panel1</image:caption><image:title>panel1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/brkwl_herodotus.png</image:loc><image:caption>brkwlherodotus</image:caption><image:title>brkwlherodotus</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/overlay.png</image:loc><image:caption>overlay</image:caption><image:title>overlay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MTI_Blog_Herodotus2.jpg</image:loc><image:caption>MTIBlogHerodotus2</image:caption><image:title>MTIBlogHerodotus2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/randomizing_delays.png</image:loc><image:caption>randomizingdelays</image:caption><image:title>randomizingdelays</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/overlay_code.png</image:loc><image:caption>overlaycode</image:caption><image:title>overlaycode</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/dropper.png</image:loc><image:caption>dropper</image:caption><image:title>dropper</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/brkwl_brokewell.png</image:loc><image:caption>brkwlbrokewell</image:caption><image:title>brkwlbrokewell</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/panel_delay.png</image:loc><image:caption>paneldelay</image:caption><image:title>paneldelay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/omitted_features.png</image:loc><image:caption>omittedfeatures</image:caption><image:title>omittedfeatures</image:title></image:image><lastmod>2025-10-28</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-3-cyber-defence-community-and-collaboration-with-craig-rice</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_CraigRice.png</image:loc><image:caption>TFFusionFiresideCraigRice</image:caption><image:title>TFFusionFiresideCraigRice</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2024-10-31</lastmod></url><url><loc>https://www.threatfabric.com/webinars</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/hacker.png</image:loc><image:caption>hacker</image:caption><image:title>hacker</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2025-06-12</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-secures-strategic-investment-from-onespan-to-accelerate-global-fraud-and-scam-prevention</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_PressRelease_Onespan2.jpg</image:loc><image:caption>TFPressReleaseOnespan2</image:caption><image:title>TFPressReleaseOnespan2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2025-10-06</lastmod></url><url><loc>https://www.threatfabric.com/blogs/mysterybot__a_new_android_banking_trojan_ready_for_android_7_and_8</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/mysterybot/MysteryL0cker_dashboard.webp</image:loc><image:caption>MysteryL0ckerdashboard</image:caption><image:title>MysteryL0ckerdashboard</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/mysterybot/koodous_mystery_loki_c2_link.webp</image:loc><image:caption>koodousmysterylokic2link</image:caption><image:title>koodousmysterylokic2link</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/mysterybot/foreground_apps_list.png</image:loc><image:caption>foregroundappslist</image:caption><image:title>foregroundappslist</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/mysterybot/usagestats_permission.webp</image:loc><image:caption>usagestatspermission</image:caption><image:title>usagestatspermission</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/mysterybot/botcommands.webp</image:loc><image:caption>botcommands</image:caption><image:title>botcommands</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/mysterybot/logo.webp</image:loc><image:caption>logo</image:caption><image:title>logo</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/behavioral-analytics-scams</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202025-03-13%20at%2011.07.24.png</image:loc><image:caption>Screenshot20250313at110724</image:caption><image:title>Screenshot20250313at110724</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202025-03-13%20at%2011.06.20.png</image:loc><image:caption>Screenshot20250313at110620</image:caption><image:title>Screenshot20250313at110620</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202025-03-13%20at%2011.05.08.png</image:loc><image:caption>Screenshot20250313at110508</image:caption><image:title>Screenshot20250313at110508</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202025-03-13%20at%2011.05.42.png</image:loc><image:caption>Screenshot20250313at110542</image:caption><image:title>Screenshot20250313at110542</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202025-03-13%20at%2011.09.12.png</image:loc><image:caption>Screenshot20250313at110912</image:caption><image:title>Screenshot20250313at110912</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Lightning%20Campaign%207.1%20-%20Behavioral%20Analytics_Scams.jpg</image:loc><image:caption>LightningCampaign71BehavioralAnalyticsScams</image:caption><image:title>LightningCampaign71BehavioralAnalyticsScams</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2025-04-08</lastmod></url><url><loc>https://www.threatfabric.com/blogs/anatsa-hits-uk-and-dach-with-new-campaign</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/anatsa_capabilities.jpeg</image:loc><image:caption>anatsacapabilities</image:caption><image:title>anatsacapabilities</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/dropper.jpeg</image:loc><image:caption>dropper</image:caption><image:title>dropper</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/killchain.jpeg</image:loc><image:caption>killchain</image:caption><image:title>killchain</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/targeted_countries.jpeg</image:loc><image:caption>targetedcountries</image:caption><image:title>targetedcountries</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/cover-3.png</image:loc><image:caption>cover3</image:caption><image:title>cover3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/anatsa_samples.jpeg</image:loc><image:caption>anatsasamples</image:caption><image:title>anatsasamples</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/targets_us.jpg</image:loc><image:caption>targetsus</image:caption><image:title>targetsus</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/timeline.jpg</image:loc><image:caption>timeline</image:caption><image:title>timeline</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-06-26</lastmod></url><url><loc>https://www.threatfabric.com/blogs/authentication-in-the-age-of-spoofed-biometrics</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_HologramLaptop_16-9%20(1).png</image:loc><image:caption>TFHologramLaptop1691</image:caption><image:title>TFHologramLaptop1691</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image-png-Mar-21-2024-01-12-23-9751-PM.png</image:loc><image:caption>imagepngMar2120240112239751PM</image:caption><image:title>imagepngMar2120240112239751PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2024-03-21</lastmod></url><url><loc>https://www.threatfabric.com/blogs/massiv-when-your-iptv-app-terminates-your-savings</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide2-Feb-18-2026-10-26-57-0045-AM.png</image:loc><image:caption>Slide2Feb1820261026570045AM</image:caption><image:title>Slide2Feb1820261026570045AM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide1-Feb-18-2026-10-26-56-8271-AM.png</image:loc><image:caption>Slide1Feb1820261026568271AM</image:caption><image:title>Slide1Feb1820261026568271AM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide3-Feb-18-2026-10-26-57-0185-AM.png</image:loc><image:caption>Slide3Feb1820261026570185AM</image:caption><image:title>Slide3Feb1820261026570185AM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/code.png</image:loc><image:caption>code</image:caption><image:title>code</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_IPTV4.jpg</image:loc><image:caption>TFIPTV4</image:caption><image:title>TFIPTV4</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide4-Feb-18-2026-10-26-56-9225-AM.png</image:loc><image:caption>Slide4Feb1820261026569225AM</image:caption><image:title>Slide4Feb1820261026569225AM</image:title></image:image><lastmod>2026-02-19</lastmod></url><url><loc>https://www.threatfabric.com/beating-rats-with-frs-device-risk</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/BelgiumBubble.jpg</image:loc><image:caption>BelgiumBubble</image:caption><image:title>BelgiumBubble</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-12-10%20at%2015.27.42.png</image:loc><image:caption>Screenshot20241210at152742</image:caption><image:title>Screenshot20241210at152742</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ThreatFabric_SocialCard-1.png</image:loc><image:caption>ThreatFabricSocialCard1</image:caption><image:title>ThreatFabricSocialCard1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/synergy.png</image:loc><image:caption>synergy</image:caption><image:title>synergy</image:title></image:image><lastmod>2026-03-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-uncovers-cyber-espionage-linked-to-state-backed-group-misusing-mobile-payment-systems</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ThreatFabric_SocialCard.png</image:loc><image:caption>ThreatFabricSocialCard</image:caption><image:title>ThreatFabricSocialCard</image:title></image:image><lastmod>2023-10-02</lastmod></url><url><loc>https://www.threatfabric.com/news</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/hacker.png</image:loc><image:caption>hacker</image:caption><image:title>hacker</image:title></image:image><lastmod>2024-06-17</lastmod></url><url><loc>https://www.threatfabric.com/resources/voice-phishing-using-rat</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/investment-scams-vs-fraud-kill-chain</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-03-04%20at%2008.51.20.png</image:loc><image:caption>Screenshot20240304at085120</image:caption><image:title>Screenshot20240304at085120</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_InvestmentScams.jpg</image:loc><image:caption>TFInvestmentScams</image:caption><image:title>TFInvestmentScams</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/InvestmentFraud_Details@2x.png</image:loc><image:caption>InvestmentFraudDetails2x</image:caption><image:title>InvestmentFraudDetails2x</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/InvestmentFraud_FeaturedImage@2x-1.png</image:loc><image:caption>InvestmentFraudFeaturedImage2x1</image:caption><image:title>InvestmentFraudFeaturedImage2x1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-03-04%20at%2008.52.04.png</image:loc><image:caption>Screenshot20240304at085204</image:caption><image:title>Screenshot20240304at085204</image:title></image:image><lastmod>2024-04-24</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-recognised-by-gartner-as-a-sample-vendor-for-emerging-tech-impact-radar-security</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Gartner_January2024.png</image:loc><image:caption>TFGartnerJanuary2024</image:caption><image:title>TFGartnerJanuary2024</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2024-01-15</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-appoints-andrew-hawthorne-as-vp-of-global-sales</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MicrosoftTeams-image%20(38).png</image:loc><image:caption>MicrosoftTeamsimage38</image:caption><image:title>MicrosoftTeamsimage38</image:title></image:image><lastmod>2023-09-18</lastmod></url><url><loc>https://www.threatfabric.com/blogs/ermac-another-cerberus-reborn</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ermac/context.webp</image:loc><image:caption>context</image:caption><image:title>context</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ermac/ermac.webp</image:loc><image:caption>ermac</image:caption><image:title>ermac</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ermac/campaigns.webp</image:loc><image:caption>campaigns</image:caption><image:title>campaigns</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ermac/traffic.webp</image:loc><image:caption>traffic</image:caption><image:title>traffic</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ermac/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ermac/amplebot.webp</image:loc><image:caption>amplebot</image:caption><image:title>amplebot</image:title></image:image><lastmod>2023-03-03</lastmod></url><url><loc>https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/cerberus/twitter.png</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/cerberus/evolution.png</image:loc><image:caption>evolution</image:caption><image:title>evolution</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/cerberus/accesibility.png</image:loc><image:caption>accesibility</image:caption><image:title>accesibility</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/cerberus/cover-cerberus.png</image:loc><image:caption>covercerberus</image:caption><image:title>covercerberus</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/cerberus/overlay3.png</image:loc><image:caption>overlay3</image:caption><image:title>overlay3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/cerberus/overlay1.png</image:loc><image:caption>overlay1</image:caption><image:title>overlay1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/cerberus/overlay2.png</image:loc><image:caption>overlay2</image:caption><image:title>overlay2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-03-03</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-9-from-telecom-to-threat-intel-reflections-on-nordic-cyber-resilience-with-morten-tandle</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_MortenTandle.jpg</image:loc><image:caption>TFFusionFiresideMortenTandle</image:caption><image:title>TFFusionFiresideMortenTandle</image:title></image:image><lastmod>2025-03-27</lastmod></url><url><loc>https://www.threatfabric.com/blogs/vultur-v-for-vnc</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/settings-panel.webp</image:loc><image:caption>settingspanel</image:caption><image:title>settingspanel</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/a11y.webp</image:loc><image:caption>a11y</image:caption><image:title>a11y</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/brunhilda-old-vs-new.webp</image:loc><image:caption>brunhildaoldvsnew</image:caption><image:title>brunhildaoldvsnew</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/vultur-flow-diagram.webp</image:loc><image:caption>vulturflowdiagram</image:caption><image:title>vulturflowdiagram</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/playstore.webp</image:loc><image:caption>playstore</image:caption><image:title>playstore</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/brunhilda-vs-vultur.webp</image:loc><image:caption>brunhildavsvultur</image:caption><image:title>brunhildavsvultur</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/intro.webp</image:loc><image:caption>intro</image:caption><image:title>intro</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/registration.png</image:loc><image:caption>registration</image:caption><image:title>registration</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/brunhilda-sample-mti.png</image:loc><image:caption>brunhildasamplemti</image:caption><image:title>brunhildasamplemti</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/targets-graph.png</image:loc><image:caption>targetsgraph</image:caption><image:title>targetsgraph</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/ginp_a_malware_patchwork_borrowing_from_anubis</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ginp-malware/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ginp-malware/startwhilerequest.webp</image:loc><image:caption>startwhilerequest</image:caption><image:title>startwhilerequest</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ginp-malware/overlays4.webp</image:loc><image:caption>overlays4</image:caption><image:title>overlays4</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ginp-malware/overlays2.webp</image:loc><image:caption>overlays2</image:caption><image:title>overlays2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ginp-malware/accesibility.png</image:loc><image:caption>accesibility</image:caption><image:title>accesibility</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ginp-malware/overlays3.webp</image:loc><image:caption>overlays3</image:caption><image:title>overlays3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ginp-malware/receivers.png</image:loc><image:caption>receivers</image:caption><image:title>receivers</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ginp-malware/generic-grabber.webp</image:loc><image:caption>genericgrabber</image:caption><image:title>genericgrabber</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ginp-malware/overlays1.webp</image:loc><image:caption>overlays1</image:caption><image:title>overlays1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ginp-malware/santander-overlays.webp</image:loc><image:caption>santanderoverlays</image:caption><image:title>santanderoverlays</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-appoints-emma-galvani-as-head-of-marketing</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Team_Emma.jpg</image:loc><image:caption>TFTeamEmma</image:caption><image:title>TFTeamEmma</image:title></image:image><lastmod>2023-09-13</lastmod></url><url><loc>https://www.threatfabric.com/blogs/toad-fraud</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/toad.png</image:loc><image:caption>toad</image:caption><image:title>toad</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/smsspy.png</image:loc><image:caption>smsspy</image:caption><image:title>smsspy</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/panel-1.png</image:loc><image:caption>panel1</image:caption><image:title>panel1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/copybara_overlay.png</image:loc><image:caption>copybaraoverlay</image:caption><image:title>copybaraoverlay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cover-1.jpg</image:loc><image:caption>cover1</image:caption><image:title>cover1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/copybara_form.png</image:loc><image:caption>copybaraform</image:caption><image:title>copybaraform</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/phishing.png</image:loc><image:caption>phishing</image:caption><image:title>phishing</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/copybara.png</image:loc><image:caption>copybara</image:caption><image:title>copybara</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-8-banking-security-and-nordic-collaboration-with-h%C3%A1kon-akerlund</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_HakonAkerlund.jpg</image:loc><image:caption>TFFusionFiresideHakonAkerlund</image:caption><image:title>TFFusionFiresideHakonAkerlund</image:title></image:image><lastmod>2025-02-25</lastmod></url><url><loc>https://www.threatfabric.com/resources/account-takeover-ato-fraud</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/malware-successfully-exploiting-bnpl-apps</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/screenshot-2022-09-07-at-22.01.07.png</image:loc><image:caption>screenshot20220907at220107</image:caption><image:title>screenshot20220907at220107</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/tf_core_story_2022_chs_v1.6.025.jpeg</image:loc><image:caption>tfcorestory2022chsv16025</image:caption><image:title>tfcorestory2022chsv16025</image:title></image:image><lastmod>2023-03-03</lastmod></url><url><loc>https://www.threatfabric.com/blogs/vultur-con-v-de-vnc</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/settings-panel.webp</image:loc><image:caption>settingspanel</image:caption><image:title>settingspanel</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/brunhilda-old-vs-new.webp</image:loc><image:caption>brunhildaoldvsnew</image:caption><image:title>brunhildaoldvsnew</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/playstore.webp</image:loc><image:caption>playstore</image:caption><image:title>playstore</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/a11y.webp</image:loc><image:caption>a11y</image:caption><image:title>a11y</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/targets-graph.png</image:loc><image:caption>targetsgraph</image:caption><image:title>targetsgraph</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/registration.png</image:loc><image:caption>registration</image:caption><image:title>registration</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/brunhilda-vs-vultur.webp</image:loc><image:caption>brunhildavsvultur</image:caption><image:title>brunhildavsvultur</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/vultur-flow-diagram.webp</image:loc><image:caption>vulturflowdiagram</image:caption><image:title>vulturflowdiagram</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/vultur/intro.webp</image:loc><image:caption>intro</image:caption><image:title>intro</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/brata-a-tale-of-three-families</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/b4a.png</image:loc><image:caption>b4a</image:caption><image:title>b4a</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/copybara-1.png</image:loc><image:caption>copybara1</image:caption><image:title>copybara1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/tale.png</image:loc><image:caption>tale</image:caption><image:title>tale</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/voice.png</image:loc><image:caption>voice</image:caption><image:title>voice</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/screenshot.png</image:loc><image:caption>screenshot</image:caption><image:title>screenshot</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/amex_rental.png</image:loc><image:caption>amexrental</image:caption><image:title>amexrental</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/brata.png</image:loc><image:caption>brata</image:caption><image:title>brata</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cover-2.jpg</image:loc><image:caption>cover2</image:caption><image:title>cover2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/amextroll.png</image:loc><image:caption>amextroll</image:caption><image:title>amextroll</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/amex_targets.png</image:loc><image:caption>amextargets</image:caption><image:title>amextargets</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/copybara_overlay-1.png</image:loc><image:caption>copybaraoverlay1</image:caption><image:title>copybaraoverlay1</image:title></image:image><lastmod>2023-06-27</lastmod></url><url><loc>https://www.threatfabric.com/blogs/letscall-new-sophisticated-vishing-toolset</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/letscall-screen3.png</image:loc><image:caption>letscallscreen3</image:caption><image:title>letscallscreen3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/letscall-screen5-1.png</image:loc><image:caption>letscallscreen51</image:caption><image:title>letscallscreen51</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/letscall-screen1.png</image:loc><image:caption>letscallscreen1</image:caption><image:title>letscallscreen1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-28%20at%2010.42.08.png</image:loc><image:caption>Screenshot20230628at104208</image:caption><image:title>Screenshot20230628at104208</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-15%20at%2010.57.48.png</image:loc><image:caption>Screenshot20230615at105748</image:caption><image:title>Screenshot20230615at105748</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-08%20at%2017.49.54%20cut.png</image:loc><image:caption>Screenshot20230608at174954cut</image:caption><image:title>Screenshot20230608at174954cut</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Blog_Letscall.jpg</image:loc><image:caption>TFBlogLetscall</image:caption><image:title>TFBlogLetscall</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-15%20at%2012.30.18.png</image:loc><image:caption>Screenshot20230615at123018</image:caption><image:title>Screenshot20230615at123018</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-16%20at%2016.45.07.png</image:loc><image:caption>Screenshot20230616at164507</image:caption><image:title>Screenshot20230616at164507</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-14%20at%2016.28.35.png</image:loc><image:caption>Screenshot20230614at162835</image:caption><image:title>Screenshot20230614at162835</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-15%20at%2014.26.06.png</image:loc><image:caption>Screenshot20230615at142606</image:caption><image:title>Screenshot20230615at142606</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/admin_menu.png</image:loc><image:caption>adminmenu</image:caption><image:title>adminmenu</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-14%20at%2017.35.25.png</image:loc><image:caption>Screenshot20230614at173525</image:caption><image:title>Screenshot20230614at173525</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-15%20at%2013.49.42-1.png</image:loc><image:caption>Screenshot20230615at1349421</image:caption><image:title>Screenshot20230615at1349421</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/letscall-screen6.png</image:loc><image:caption>letscallscreen6</image:caption><image:title>letscallscreen6</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/video_demo1.gif</image:loc><image:caption>videodemo1</image:caption><image:title>videodemo1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-20%20at%2012.54.07.png</image:loc><image:caption>Screenshot20230620at125407</image:caption><image:title>Screenshot20230620at125407</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-15%20at%2012.05.00.png</image:loc><image:caption>Screenshot20230615at120500</image:caption><image:title>Screenshot20230615at120500</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-14%20at%2017.27.59.png</image:loc><image:caption>Screenshot20230614at172759</image:caption><image:title>Screenshot20230614at172759</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/letscall-screen4.png</image:loc><image:caption>letscallscreen4</image:caption><image:title>letscallscreen4</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-14%20at%2016.35.38.png</image:loc><image:caption>Screenshot20230614at163538</image:caption><image:title>Screenshot20230614at163538</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-15%20at%2011.27.32.png</image:loc><image:caption>Screenshot20230615at112732</image:caption><image:title>Screenshot20230615at112732</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-06-28%20at%2010.33.44.png</image:loc><image:caption>Screenshot20230628at103344</image:caption><image:title>Screenshot20230628at103344</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/letscall-screen2.png</image:loc><image:caption>letscallscreen2</image:caption><image:title>letscallscreen2</image:title></image:image><lastmod>2023-07-07</lastmod></url><url><loc>https://www.threatfabric.com/blogs/chameleon-is-now-targeting-employees-masquerading-as-crm-app</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide3-Jul-29-2024-03-10-47-9967-PM.png</image:loc><image:caption>Slide3Jul2920240310479967PM</image:caption><image:title>Slide3Jul2920240310479967PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide1-Jul-29-2024-03-09-02-8496-PM.png</image:loc><image:caption>Slide1Jul2920240309028496PM</image:caption><image:title>Slide1Jul2920240309028496PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Chameleon_2024.jpg</image:loc><image:caption>TFChameleon2024</image:caption><image:title>TFChameleon2024</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide2-Jul-29-2024-03-10-32-6973-PM.png</image:loc><image:caption>Slide2Jul2920240310326973PM</image:caption><image:title>Slide2Jul2920240310326973PM</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.threatfabric.com/frs</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-12-10%20at%2015.27.42.png</image:loc><image:caption>Screenshot20241210at152742</image:caption><image:title>Screenshot20241210at152742</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/harry_tf_miyazaki_style_image_of_jellyfish_playing_tug-of-war_w_00f220c1-9dd8-44e8-9367-e3e18b0485bc-1.jpg</image:loc><image:caption>harrytfmiyazakistyleimageofjellyfishplayingtugofwarw00f220c19dd844e89367e3e18b0485bc1</image:caption><image:title>harrytfmiyazakistyleimageofjellyfishplayingtugofwarw00f220c19dd844e89367e3e18b0485bc1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/synergy.png</image:loc><image:caption>synergy</image:caption><image:title>synergy</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ThreatFabric_SocialCard-1.png</image:loc><image:caption>ThreatFabricSocialCard1</image:caption><image:title>ThreatFabricSocialCard1</image:title></image:image><lastmod>2026-03-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/device-intelligence-adapting-beyond-fingerprinting</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ATO%20-%20vishing.jpg</image:loc><image:caption>ATOvishing</image:caption><image:title>ATOvishing</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_HyenaHologram.jpg</image:loc><image:caption>TFHyenaHologram</image:caption><image:title>TFHyenaHologram</image:title></image:image><lastmod>2024-11-14</lastmod></url><url><loc>https://www.threatfabric.com/blogs/sturnus-banking-trojan-bypassing-whatsapp-telegram-and-signal</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/MessagingApps.png</image:loc><image:caption>MessagingApps</image:caption><image:title>MessagingApps</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/treemode.png</image:loc><image:caption>treemode</image:caption><image:title>treemode</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Block_bank_overlays.png</image:loc><image:caption>Blockbankoverlays</image:caption><image:title>Blockbankoverlays</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image-png-Nov-18-2025-12-47-39-4206-PM.png</image:loc><image:caption>imagepngNov1820251247394206PM</image:caption><image:title>imagepngNov1820251247394206PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/communication.png</image:loc><image:caption>communication</image:caption><image:title>communication</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/vnc.png</image:loc><image:caption>vnc</image:caption><image:title>vnc</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/env.png</image:loc><image:caption>env</image:caption><image:title>env</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MTI_Blog_Sturnus3.jpg</image:loc><image:caption>MTIBlogSturnus3</image:caption><image:title>MTIBlogSturnus3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202025-11-18%20at%2012.30.15.png</image:loc><image:caption>Screenshot20251118at123015</image:caption><image:title>Screenshot20251118at123015</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Sturnus.png</image:loc><image:caption>Sturnus</image:caption><image:title>Sturnus</image:title></image:image><lastmod>2025-11-20</lastmod></url><url><loc>https://www.threatfabric.com/blogs/blackrock_the_trojan_that_wanted_to_get_them_all</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/blackrock/accessibility.png</image:loc><image:caption>accessibility</image:caption><image:title>accessibility</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/blackrock/lokibot_malware_family.png</image:loc><image:caption>lokibotmalwarefamily</image:caption><image:title>lokibotmalwarefamily</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/blackrock/cc_targets_per_category.png</image:loc><image:caption>cctargetspercategory</image:caption><image:title>cctargetspercategory</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/blackrock/overlay.png</image:loc><image:caption>overlay</image:caption><image:title>overlay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/blackrock/cc_overlay.png</image:loc><image:caption>ccoverlay</image:caption><image:title>ccoverlay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/blackrock/top15_targeted_countries.png</image:loc><image:caption>top15targetedcountries</image:caption><image:title>top15targetedcountries</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/blackrock/credentials_targets_per_category.png</image:loc><image:caption>credentialstargetspercategory</image:caption><image:title>credentialstargetspercategory</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/blackrock/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/jobs/back-end-java-engineer</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2024-09-09</lastmod></url><url><loc>https://www.threatfabric.com/blogs/inform-and-threatfabric-announce-collaboration-endorsed-by-rabobank</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Inform_PartnershipAnnouncement_SOCIAL.jpg</image:loc><image:caption>InformPartnershipAnnouncementSOCIAL</image:caption><image:title>InformPartnershipAnnouncementSOCIAL</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2025-09-02</lastmod></url><url><loc>https://www.threatfabric.com/blogs/bugdrop-new-dropper-bypassing-google-security-measures</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/bugDrop/poc.png</image:loc><image:caption>poc</image:caption><image:title>poc</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/error.png</image:loc><image:caption>error</image:caption><image:title>error</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cover%20(1)-1.png</image:loc><image:caption>cover11</image:caption><image:title>cover11</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/panel-2.png</image:loc><image:caption>panel2</image:caption><image:title>panel2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/group.png</image:loc><image:caption>group</image:caption><image:title>group</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/config.png</image:loc><image:caption>config</image:caption><image:title>config</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/overlay.png</image:loc><image:caption>overlay</image:caption><image:title>overlay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/brox.png</image:loc><image:caption>brox</image:caption><image:title>brox</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/pakistan.png</image:loc><image:caption>pakistan</image:caption><image:title>pakistan</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-6-navigating-fraud-trends-with-freddy-arthur-from-nice-actimize</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_FreddyArthur.png</image:loc><image:caption>TFFusionFiresideFreddyArthur</image:caption><image:title>TFFusionFiresideFreddyArthur</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2024-12-12</lastmod></url><url><loc>https://www.threatfabric.com/blogs/epic-versus-google-what-about-mobile-malware</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_GoogleStreet.jpg</image:loc><image:caption>TFGoogleStreet</image:caption><image:title>TFGoogleStreet</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/anatsa_droppers_timeline.png</image:loc><image:caption>anatsadropperstimeline</image:caption><image:title>anatsadropperstimeline</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2024-10-21</lastmod></url><url><loc>https://www.threatfabric.com/blogs/sova-new-trojan-with-fowl-intentions</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sova/wallets.webp</image:loc><image:caption>wallets</image:caption><image:title>wallets</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sova/targets.webp</image:loc><image:caption>targets</image:caption><image:title>targets</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sova/graph.webp</image:loc><image:caption>graph</image:caption><image:title>graph</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sova/schema.webp</image:loc><image:caption>schema</image:caption><image:title>schema</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sova/context.webp</image:loc><image:caption>context</image:caption><image:title>context</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sova/cover.png</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sova/3stage.webp</image:loc><image:caption>3stage</image:caption><image:title>3stage</image:title></image:image><lastmod>2023-06-27</lastmod></url><url><loc>https://www.threatfabric.com/blogs/brokewell-do-not-go-broke-by-new-banking-malware</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide4-Apr-17-2024-10-25-40-7838-PM.png</image:loc><image:caption>Slide4Apr1720241025407838PM</image:caption><image:title>Slide4Apr1720241025407838PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide5-Apr-17-2024-10-25-40-6369-PM.png</image:loc><image:caption>Slide5Apr1720241025406369PM</image:caption><image:title>Slide5Apr1720241025406369PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide3-Apr-17-2024-10-25-41-3370-PM.png</image:loc><image:caption>Slide3Apr1720241025413370PM</image:caption><image:title>Slide3Apr1720241025413370PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide1-Apr-17-2024-10-25-40-6370-PM.png</image:loc><image:caption>Slide1Apr1720241025406370PM</image:caption><image:title>Slide1Apr1720241025406370PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide2-4.png</image:loc><image:caption>Slide24</image:caption><image:title>Slide24</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/harry_tf_money_coins_in_well_miyazaki_style_drawing_of_water_we_0237f000-5c27-4a04-bb8c-864f66d32459.jpg</image:loc><image:caption>harrytfmoneycoinsinwellmiyazakistyledrawingofwaterwe0237f0005c274a04bb8c864f66d32459</image:caption><image:title>harrytfmoneycoinsinwellmiyazakistyledrawingofwaterwe0237f0005c274a04bb8c864f66d32459</image:title></image:image><lastmod>2024-04-25</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-appoints-andy-chandler-as-chief-commercial-officer</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Andy%20Chandler.png</image:loc><image:caption>AndyChandler</image:caption><image:title>AndyChandler</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-06-06</lastmod></url><url><loc>https://www.threatfabric.com/blogs/smishing-campaign-in-nl-spreading-cabassous-and-anatsa</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/smishing/tweet.png</image:loc><image:caption>tweet</image:caption><image:title>tweet</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/overlay_2.png</image:loc><image:caption>overlay2</image:caption><image:title>overlay2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/smishing/ups_fake_page_uk.png</image:loc><image:caption>upsfakepageuk</image:caption><image:title>upsfakepageuk</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/smishing/ups_fake_page_nl.png</image:loc><image:caption>upsfakepagenl</image:caption><image:title>upsfakepagenl</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/smishing/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/overlay_1.png</image:loc><image:caption>overlay1</image:caption><image:title>overlay1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2023-06-27</lastmod></url><url><loc>https://www.threatfabric.com/blogs/anatsa-targets-north-america-uses-proven-mobile-campaign-process</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/undefined-3.png</image:loc><image:caption>undefined3</image:caption><image:title>undefined3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Anatsa_BlogUSA.jpg</image:loc><image:caption>TFAnatsaBlogUSA</image:caption><image:title>TFAnatsaBlogUSA</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2025-07-08</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-10-fusion-in-practice-with-senan-moloney</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_SenanMoloney.jpg</image:loc><image:caption>TFFusionFiresideSenanMoloney</image:caption><image:title>TFFusionFiresideSenanMoloney</image:title></image:image><lastmod>2025-05-15</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-13-insights-from-the-frontlines-of-security-with-keith-gordon</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_KeithGordon.jpg</image:loc><image:caption>TFFusionFiresideKeithGordon</image:caption><image:title>TFFusionFiresideKeithGordon</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2025-10-21</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-has-extended-its-fraud-risk-suite-with-advanced-behavioural-analytics</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/tf_blog_ba.jpg</image:loc><image:caption>tfblogba</image:caption><image:title>tfblogba</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/TF_CORE_STORY_2022_CHS_v1.3.024.jpeg</image:loc><image:caption>TFCORESTORY2022CHSv13024</image:caption><image:title>TFCORESTORY2022CHSv13024</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/TF_CORE_STORY_2022_CHS_v1.3.023.jpeg</image:loc><image:caption>TFCORESTORY2022CHSv13023</image:caption><image:title>TFCORESTORY2022CHSv13023</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/ca_ba_threatfabric.png</image:loc><image:caption>cabathreatfabric</image:caption><image:title>cabathreatfabric</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/TF_CORE_STORY_2022_CHS_v1.3.025.jpeg</image:loc><image:caption>TFCORESTORY2022CHSv13025</image:caption><image:title>TFCORESTORY2022CHSv13025</image:title></image:image><lastmod>2023-03-03</lastmod></url><url><loc>https://www.threatfabric.com/resources/unlock-insights-the-anatsa-banking-trojan-campaign-report</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/ThreatFabric_SocialCard.png</image:loc><image:caption>ThreatFabricSocialCard</image:caption><image:title>ThreatFabricSocialCard</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2024-02-05</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-15-exploring-psd3-and-psr-with-frederik-mennes</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_FrederikMennes.jpg</image:loc><image:caption>TFFusionFiresideFrederikMennes</image:caption><image:title>TFFusionFiresideFrederikMennes</image:title></image:image><lastmod>2026-01-15</lastmod></url><url><loc>https://www.threatfabric.com/blogs/anubis_2_malware_and_afterlife</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/anubis/targets_per_region.png</image:loc><image:caption>targetsperregion</image:caption><image:title>targetsperregion</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/anubis/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/anubis/target_types.webp</image:loc><image:caption>targettypes</image:caption><image:title>targettypes</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/anubis/targets_per_country.png</image:loc><image:caption>targetspercountry</image:caption><image:title>targetspercountry</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/anubis/bankbot.jpg</image:loc><image:caption>bankbot</image:caption><image:title>bankbot</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/anubis/targets_per_subregion.png</image:loc><image:caption>targetspersubregion</image:caption><image:title>targetspersubregion</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/anubis/anubis.webp</image:loc><image:caption>anubis</image:caption><image:title>anubis</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/anubis/bank_bot_tree.webp</image:loc><image:caption>bankbottree</image:caption><image:title>bankbottree</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/phantomcard-new-nfc-driven-android-malware-emerging-in-brazil</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide5-Aug-11-2025-04-27-58-8937-PM.png</image:loc><image:caption>Slide5Aug1120250427588937PM</image:caption><image:title>Slide5Aug1120250427588937PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide3-Aug-11-2025-04-27-58-9509-PM.png</image:loc><image:caption>Slide3Aug1120250427589509PM</image:caption><image:title>Slide3Aug1120250427589509PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/phantomcard-step-1.png</image:loc><image:caption>phantomcardstep1</image:caption><image:title>phantomcardstep1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide4-Aug-11-2025-04-27-58-3299-PM.png</image:loc><image:caption>Slide4Aug1120250427583299PM</image:caption><image:title>Slide4Aug1120250427583299PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide1-Aug-11-2025-04-27-58-3965-PM.png</image:loc><image:caption>Slide1Aug1120250427583965PM</image:caption><image:title>Slide1Aug1120250427583965PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/phantomcard-step-2.png</image:loc><image:caption>phantomcardstep2</image:caption><image:title>phantomcardstep2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide2-Aug-11-2025-04-27-58-5192-PM.png</image:loc><image:caption>Slide2Aug1120250427585192PM</image:caption><image:title>Slide2Aug1120250427585192PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/phantomcard-code-1.png</image:loc><image:caption>phantomcardcode1</image:caption><image:title>phantomcardcode1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/phantomcard-step-3.png</image:loc><image:caption>phantomcardstep3</image:caption><image:title>phantomcardstep3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/phantomcard-code-2.png</image:loc><image:caption>phantomcardcode2</image:caption><image:title>phantomcardcode2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide6-Aug-12-2025-08-05-37-1219-AM.png</image:loc><image:caption>Slide6Aug1220250805371219AM</image:caption><image:title>Slide6Aug1220250805371219AM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_MTI_PhantomCard.jpg</image:loc><image:caption>TFMTIPhantomCard</image:caption><image:title>TFMTIPhantomCard</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/phantomcard-step-4.png</image:loc><image:caption>phantomcardstep4</image:caption><image:title>phantomcardstep4</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/regions.png</image:loc><image:caption>regions</image:caption><image:title>regions</image:title></image:image><lastmod>2025-08-14</lastmod></url><url><loc>https://www.threatfabric.com/resources/fraud-risk-suite</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2023-08-24</lastmod></url><url><loc>https://www.threatfabric.com/blogs/exobot_v2_update_staying_ahead_of_the_competition</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-update/exobot_v2_update_staying_ahead_of_the_competition_web_injects_in_the_exobot_panel.webp</image:loc><image:caption>exobotv2updatestayingaheadofthecompetitionwebinjectsintheexobotpanel</image:caption><image:title>exobotv2updatestayingaheadofthecompetitionwebinjectsintheexobotpanel</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-update/exobot_v2_update_staying_ahead_of_the_competition_decrypted_http_traffic.png</image:loc><image:caption>exobotv2updatestayingaheadofthecompetitiondecryptedhttptraffic</image:caption><image:title>exobotv2updatestayingaheadofthecompetitiondecryptedhttptraffic</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-update/exobot_v2_update_staying_ahead_of_the_competition_obfuscated_loader_code.webp</image:loc><image:caption>exobotv2updatestayingaheadofthecompetitionobfuscatedloadercode</image:caption><image:title>exobotv2updatestayingaheadofthecompetitionobfuscatedloadercode</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-update/exobot_v2_update_staying_ahead_of_the_competition_socks_proxy_related_strings.png</image:loc><image:caption>exobotv2updatestayingaheadofthecompetitionsocksproxyrelatedstrings</image:caption><image:title>exobotv2updatestayingaheadofthecompetitionsocksproxyrelatedstrings</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-update/exobot_v2_update_staying_ahead_of_the_competition_encrypted_http_traffic.png</image:loc><image:caption>exobotv2updatestayingaheadofthecompetitionencryptedhttptraffic</image:caption><image:title>exobotv2updatestayingaheadofthecompetitionencryptedhttptraffic</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-update/exobot_v2_update_staying_ahead_of_the_competition_main_module_functions.png</image:loc><image:caption>exobotv2updatestayingaheadofthecompetitionmainmodulefunctions</image:caption><image:title>exobotv2updatestayingaheadofthecompetitionmainmodulefunctions</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-update/csd_android_trojan_detection.png</image:loc><image:caption>csdandroidtrojandetection</image:caption><image:title>csdandroidtrojandetection</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/sophisticated-google-play-bankbot-trojan-campaigns</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sophisticated-google/sophisticated_google_play_bankbot_trojan_campaigns_bankbot_apps_that_have_been_uploaded_to_google_play.webp</image:loc><image:caption>sophisticatedgoogleplaybankbottrojancampaignsbankbotappsthathavebeenuploadedtogoogleplay</image:caption><image:title>sophisticatedgoogleplaybankbottrojancampaignsbankbotappsthathavebeenuploadedtogoogleplay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sophisticated-google/sophisticated_google_play_bankbot_trojan_campaigns_required_permissions.webp</image:loc><image:caption>sophisticatedgoogleplaybankbottrojancampaignsrequiredpermissions</image:caption><image:title>sophisticatedgoogleplaybankbottrojancampaignsrequiredpermissions</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sophisticated-google/sophisticated_google_play_bankbot_trojan_campaigns_bankbot_trojan_flowchart.jpg</image:loc><image:caption>sophisticatedgoogleplaybankbottrojancampaignsbankbottrojanflowchart</image:caption><image:title>sophisticatedgoogleplaybankbottrojancampaignsbankbottrojanflowchart</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sophisticated-google/sophisticated_google_play_bankbot_trojan_campaigns_install_non_market_apps_1.png</image:loc><image:caption>sophisticatedgoogleplaybankbottrojancampaignsinstallnonmarketapps1</image:caption><image:title>sophisticatedgoogleplaybankbottrojancampaignsinstallnonmarketapps1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sophisticated-google/sophisticated_google_play_bankbot_trojan_campaigns_bankbot_dropper_investigation_samples.webp</image:loc><image:caption>sophisticatedgoogleplaybankbottrojancampaignsbankbotdropperinvestigationsamples</image:caption><image:title>sophisticatedgoogleplaybankbottrojancampaignsbankbotdropperinvestigationsamples</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sophisticated-google/sophisticated_google_play_bankbot_trojan_campaigns_nagging_install_screen_2.png</image:loc><image:caption>sophisticatedgoogleplaybankbottrojancampaignsnagginginstallscreen2</image:caption><image:title>sophisticatedgoogleplaybankbottrojancampaignsnagginginstallscreen2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sophisticated-google/sophisticated_google_play_bankbot_trojan_campaigns_nagging_install_screen_1.png</image:loc><image:caption>sophisticatedgoogleplaybankbottrojancampaignsnagginginstallscreen1</image:caption><image:title>sophisticatedgoogleplaybankbottrojancampaignsnagginginstallscreen1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sophisticated-google/sophisticated_google_play_bankbot_trojan_campaigns_real_funny_videos.webp</image:loc><image:caption>sophisticatedgoogleplaybankbottrojancampaignsrealfunnyvideos</image:caption><image:title>sophisticatedgoogleplaybankbottrojancampaignsrealfunnyvideos</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sophisticated-google/sophisticated_google_play_bankbot_trojan_campaigns_apks_with_network_host_185_153_198_52.png</image:loc><image:caption>sophisticatedgoogleplaybankbottrojancampaignsapkswithnetworkhost18515319852</image:caption><image:title>sophisticatedgoogleplaybankbottrojancampaignsapkswithnetworkhost18515319852</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sophisticated-google/sophisticated_google_play_bankbot_trojan_campaigns_install_non_market_apps_2.png</image:loc><image:caption>sophisticatedgoogleplaybankbottrojancampaignsinstallnonmarketapps2</image:caption><image:title>sophisticatedgoogleplaybankbottrojancampaignsinstallnonmarketapps2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sophisticated-google/sophisticated_google_play_bankbot_trojan_campaigns_botnet_statistics.png</image:loc><image:caption>sophisticatedgoogleplaybankbottrojancampaignsbotnetstatistics</image:caption><image:title>sophisticatedgoogleplaybankbottrojancampaignsbotnetstatistics</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sophisticated-google/sophisticated_google_play_bankbot_trojan_campaigns_apks_with_network_host_77_72_82_120.webp</image:loc><image:caption>sophisticatedgoogleplaybankbottrojancampaignsapkswithnetworkhost777282120</image:caption><image:title>sophisticatedgoogleplaybankbottrojancampaignsapkswithnetworkhost777282120</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/behavioural-analytics-mobile-malware-will-they-get-along</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Lightning%20Campaign%207%20-%20Behavioral%20Analytics_MobileMalware-1.jpg</image:loc><image:caption>LightningCampaign7BehavioralAnalyticsMobileMalware1</image:caption><image:title>LightningCampaign7BehavioralAnalyticsMobileMalware1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2025-05-13</lastmod></url><url><loc>https://www.threatfabric.com/resources/voice-phishing-using-malware</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/octo-new-odf-banking-trojan</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/dropper2.webp</image:loc><image:caption>dropper2</image:caption><image:title>dropper2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/dropper1.webp</image:loc><image:caption>dropper1</image:caption><image:title>dropper1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/campaign1.webp</image:loc><image:caption>campaign1</image:caption><image:title>campaign1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/panel.webp</image:loc><image:caption>panel</image:caption><image:title>panel</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/actor1.webp</image:loc><image:caption>actor1</image:caption><image:title>actor1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/actor3.webp</image:loc><image:caption>actor3</image:caption><image:title>actor3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/wrapper1.webp</image:loc><image:caption>wrapper1</image:caption><image:title>wrapper1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/actor2.webp</image:loc><image:caption>actor2</image:caption><image:title>actor2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/landing.webp</image:loc><image:caption>landing</image:caption><image:title>landing</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/capabilities.webp</image:loc><image:caption>capabilities</image:caption><image:title>capabilities</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/wrapper2.webp</image:loc><image:caption>wrapper2</image:caption><image:title>wrapper2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/campaign2.webp</image:loc><image:caption>campaign2</image:caption><image:title>campaign2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/exobot_coper.webp</image:loc><image:caption>exobotcoper</image:caption><image:title>exobotcoper</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/odf.webp</image:loc><image:caption>odf</image:caption><image:title>odf</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2023-06-27</lastmod></url><url><loc>https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/lokibot/lokibot_the_first_hybrid_android_malware_bitcoin_wallet_details.png</image:loc><image:caption>lokibotthefirsthybridandroidmalwarebitcoinwalletdetails</image:caption><image:title>lokibotthefirsthybridandroidmalwarebitcoinwalletdetails</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/lokibot/lokibot_the_first_hybrid_android_malware_hardcoded_bitcoin_address_code_snippet.webp</image:loc><image:caption>lokibotthefirsthybridandroidmalwarehardcodedbitcoinaddresscodesnippet</image:caption><image:title>lokibotthefirsthybridandroidmalwarehardcodedbitcoinaddresscodesnippet</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/lokibot/lokibot_the_first_hybrid_android_malware_screen_shown_when_the_ransomware_locks_the_phone.webp</image:loc><image:caption>lokibotthefirsthybridandroidmalwarescreenshownwhentheransomwarelocksthephone</image:caption><image:title>lokibotthefirsthybridandroidmalwarescreenshownwhentheransomwarelocksthephone</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/lokibot/lokibot_the_first_hybrid_android_malware_automatic_ransomware_activation_when_disabling_device_admin_code_snippet.webp</image:loc><image:caption>lokibotthefirsthybridandroidmalwareautomaticransomwareactivationwhendisablingdeviceadmincodesnippet</image:caption><image:title>lokibotthefirsthybridandroidmalwareautomaticransomwareactivationwhendisablingdeviceadmincodesnippet</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/lokibot/lokibot_the_first_hybrid_android_malware_malware_command_and_control_panel.png</image:loc><image:caption>lokibotthefirsthybridandroidmalwaremalwarecommandandcontrolpanel</image:caption><image:title>lokibotthefirsthybridandroidmalwaremalwarecommandandcontrolpanel</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/jobs/senior-android-developer</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2024-09-03</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-17-inside-the-chinese-smishing-triad-with-gary-warner</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_GaryWarner.jpg</image:loc><image:caption>TFFusionFiresideGaryWarner</image:caption><image:title>TFFusionFiresideGaryWarner</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2026-03-18</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-announces-partnership-with-silobreaker-to-strengthen-mobile-threat-intelligence</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/PR-Threat-fabric-1-1.jpg</image:loc><image:caption>PRThreatfabric11</image:caption><image:title>PRThreatfabric11</image:title></image:image><lastmod>2025-03-11</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-1-navigating-the-payment-pathways-with-daniel-van-delft</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_Announcement3.png</image:loc><image:caption>TFFusionFiresideAnnouncement3</image:caption><image:title>TFFusionFiresideAnnouncement3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2024-10-31</lastmod></url><url><loc>https://www.threatfabric.com/jobs/mobile-malware-analyst</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-05-18</lastmod></url><url><loc>https://www.threatfabric.com/blogs/exobot_android_banking_trojan_on_the_rise</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_bot_amount_by_country.png</image:loc><image:caption>exobotandroidbankingtrojanontherisebotamountbycountry</image:caption><image:title>exobotandroidbankingtrojanontherisebotamountbycountry</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_overlays_for_phishing_google_play_facebook_and_ing_diba.png</image:loc><image:caption>exobotandroidbankingtrojanontheriseoverlaysforphishinggoogleplayfacebookandingdiba</image:caption><image:title>exobotandroidbankingtrojanontheriseoverlaysforphishinggoogleplayfacebookandingdiba</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_code_snippet_reset_password_or_lock_device.png</image:loc><image:caption>exobotandroidbankingtrojanontherisecodesnippetresetpasswordorlockdevice</image:caption><image:title>exobotandroidbankingtrojanontherisecodesnippetresetpasswordorlockdevice</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_bot_amount_by_android_version.png</image:loc><image:caption>exobotandroidbankingtrojanontherisebotamountbyandroidversion</image:caption><image:title>exobotandroidbankingtrojanontherisebotamountbyandroidversion</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_marcher_c2_admin_panel.png</image:loc><image:caption>exobotandroidbankingtrojanontherisemarcherc2adminpanel</image:caption><image:title>exobotandroidbankingtrojanontherisemarcherc2adminpanel</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_code_snippet_malware_forcing_device_back_to_home_screen.png</image:loc><image:caption>exobotandroidbankingtrojanontherisecodesnippetmalwareforcingdevicebacktohomescreen</image:caption><image:title>exobotandroidbankingtrojanontherisecodesnippetmalwareforcingdevicebacktohomescreen</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_runtastic_sample_permission_prompt.png</image:loc><image:caption>exobotandroidbankingtrojanontheriseruntasticsamplepermissionprompt</image:caption><image:title>exobotandroidbankingtrojanontheriseruntasticsamplepermissionprompt</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_marcher_documentation_2.jpg</image:loc><image:caption>exobotandroidbankingtrojanontherisemarcherdocumentation2</image:caption><image:title>exobotandroidbankingtrojanontherisemarcherdocumentation2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_overlay_for_postbank_finanzassistent.png</image:loc><image:caption>exobotandroidbankingtrojanontheriseoverlayforpostbankfinanzassistent</image:caption><image:title>exobotandroidbankingtrojanontheriseoverlayforpostbankfinanzassistent</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_device_admin_nagging_screen.png</image:loc><image:caption>exobotandroidbankingtrojanontherisedeviceadminnaggingscreen</image:caption><image:title>exobotandroidbankingtrojanontherisedeviceadminnaggingscreen</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_code_snippet_malware_intercepting_sms_mms_messages.png</image:loc><image:caption>exobotandroidbankingtrojanontherisecodesnippetmalwareinterceptingsmsmmsmessages</image:caption><image:title>exobotandroidbankingtrojanontherisecodesnippetmalwareinterceptingsmsmmsmessages</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_marcher_mobile_banking_trojan.webp</image:loc><image:caption>exobotandroidbankingtrojanontherisemarchermobilebankingtrojan</image:caption><image:title>exobotandroidbankingtrojanontherisemarchermobilebankingtrojan</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot-marcher/exobot_android_banking_trojan_on_the_rise_marcher_documentation_1.jpg</image:loc><image:caption>exobotandroidbankingtrojanontherisemarcherdocumentation1</image:caption><image:title>exobotandroidbankingtrojanontherisemarcherdocumentation1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/stop-fraudsters-at-the-front-door-with-device-behavioural-intelligence</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Blog_FrontDoor.jpg</image:loc><image:caption>TFBlogFrontDoor</image:caption><image:title>TFBlogFrontDoor</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2025-09-23</lastmod></url><url><loc>https://www.threatfabric.com/scam-prevention-in-turkey-with-behavioural-analytics</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ScamCreature.jpg</image:loc><image:caption>ScamCreature</image:caption><image:title>ScamCreature</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/synergy.png</image:loc><image:caption>synergy</image:caption><image:title>synergy</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ThreatFabric_SocialCard-1.png</image:loc><image:caption>ThreatFabricSocialCard1</image:caption><image:title>ThreatFabricSocialCard1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-12-10%20at%2015.27.42.png</image:loc><image:caption>Screenshot20241210at152742</image:caption><image:title>Screenshot20241210at152742</image:title></image:image><lastmod>2026-03-16</lastmod></url><url><loc>https://www.threatfabric.com/vulnerability-disclosure-policy</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2025-01-13</lastmod></url><url><loc>https://www.threatfabric.com/blogs/bianlian_from_rags_to_riches_the_malware_dropper_that_had_a_dream</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/bianlian/bianlian_in_the_google_play.webp</image:loc><image:caption>bianlianinthegoogleplay</image:caption><image:title>bianlianinthegoogleplay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/bianlian/flow_diagram.png</image:loc><image:caption>flowdiagram</image:caption><image:title>flowdiagram</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/bianlian/overlay_banks.png</image:loc><image:caption>overlaybanks</image:caption><image:title>overlaybanks</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/bianlian/card.webp</image:loc><image:caption>card</image:caption><image:title>card</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/bianlian/virustotal_detection_rate_1.webp</image:loc><image:caption>virustotaldetectionrate1</image:caption><image:title>virustotaldetectionrate1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/bianlian/DroppersOverTime.png</image:loc><image:caption>DroppersOverTime</image:caption><image:title>DroppersOverTime</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/bianlian/virustotal_detection_rate_2.webp</image:loc><image:caption>virustotaldetectionrate2</image:caption><image:title>virustotaldetectionrate2</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/banking_malware_in_google_play_targeting_many_new_apps</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/banking-malware/banking_malware_in_google_play_targeting_many_new_apps_additional_google_play_app_info.png</image:loc><image:caption>bankingmalwareingoogleplaytargetingmanynewappsadditionalgoogleplayappinfo</image:caption><image:title>bankingmalwareingoogleplaytargetingmanynewappsadditionalgoogleplayappinfo</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/banking-malware/banking_malware_in_google_play_targeting_many_new_apps_funny_videos_2017_app_in_google_play.webp</image:loc><image:caption>bankingmalwareingoogleplaytargetingmanynewappsfunnyvideos2017appingoogleplay</image:caption><image:title>bankingmalwareingoogleplaytargetingmanynewappsfunnyvideos2017appingoogleplay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/banking-malware/banking_malware_in_google_play_targeting_many_new_apps_collection_of_overlays.webp</image:loc><image:caption>bankingmalwareingoogleplaytargetingmanynewappscollectionofoverlays</image:caption><image:title>bankingmalwareingoogleplaytargetingmanynewappscollectionofoverlays</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/alien_the_story_of_cerberus_demise</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/alien-demise/cerberusc2.png</image:loc><image:caption>cerberusc2</image:caption><image:title>cerberusc2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/alien-demise/alienc2.png</image:loc><image:caption>alienc2</image:caption><image:title>alienc2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/alien-demise/targets.png</image:loc><image:caption>targets</image:caption><image:title>targets</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/alien-demise/forum4.png</image:loc><image:caption>forum4</image:caption><image:title>forum4</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/alien-demise/forum3.png</image:loc><image:caption>forum3</image:caption><image:title>forum3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/alien-demise/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/alien-demise/screenshot.webp</image:loc><image:caption>screenshot</image:caption><image:title>screenshot</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/alien-demise/cerberus_samples.png</image:loc><image:caption>cerberussamples</image:caption><image:title>cerberussamples</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/alien-demise/forum1.png</image:loc><image:caption>forum1</image:caption><image:title>forum1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/alien-demise/forum2.png</image:loc><image:caption>forum2</image:caption><image:title>forum2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/alien-demise/tweet.webp</image:loc><image:caption>tweet</image:caption><image:title>tweet</image:title></image:image><lastmod>2023-06-27</lastmod></url><url><loc>https://www.threatfabric.com/contact</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://www.threatfabric.com/resources</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2025-06-12</lastmod></url><url><loc>https://www.threatfabric.com/blogs/mobile-banking-malware-vs-fraud-kill-chain</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_CyberfraudKillchain_MobileBankingMalware.png</image:loc><image:caption>TFCyberfraudKillchainMobileBankingMalware</image:caption><image:title>TFCyberfraudKillchainMobileBankingMalware</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-02-26%20at%2015.43.58.png</image:loc><image:caption>Screenshot20240226at154358</image:caption><image:title>Screenshot20240226at154358</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_CyberfraudKillchain_MobileBankingMalware_Details.png</image:loc><image:caption>TFCyberfraudKillchainMobileBankingMalwareDetails</image:caption><image:title>TFCyberfraudKillchainMobileBankingMalwareDetails</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-02-26%20at%2015.43.42.png</image:loc><image:caption>Screenshot20240226at154342</image:caption><image:title>Screenshot20240226at154342</image:title></image:image><lastmod>2024-02-28</lastmod></url><url><loc>https://www.threatfabric.com/blogs/double-trouble-in-latam</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/msi.png</image:loc><image:caption>msi</image:caption><image:title>msi</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/infections.png</image:loc><image:caption>infections</image:caption><image:title>infections</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/stats.png</image:loc><image:caption>stats</image:caption><image:title>stats</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/screens.png</image:loc><image:caption>screens</image:caption><image:title>screens</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/evolution.png</image:loc><image:caption>evolution</image:caption><image:title>evolution</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/logs.png</image:loc><image:caption>logs</image:caption><image:title>logs</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/ats.png</image:loc><image:caption>ats</image:caption><image:title>ats</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/panel.png</image:loc><image:caption>panel</image:caption><image:title>panel</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/autoit.png</image:loc><image:caption>autoit</image:caption><image:title>autoit</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/transfer.png</image:loc><image:caption>transfer</image:caption><image:title>transfer</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/brasdex-cover-minified.png</image:loc><image:caption>brasdexcoverminified</image:caption><image:title>brasdexcoverminified</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/pix.png</image:loc><image:caption>pix</image:caption><image:title>pix</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/email.png</image:loc><image:caption>email</image:caption><image:title>email</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_HeroImage1.jpg</image:loc><image:caption>TFHeroImage1</image:caption><image:title>TFHeroImage1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_TechRequirements.jpg</image:loc><image:caption>TFTechRequirements</image:caption><image:title>TFTechRequirements</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FraudTrends2026_CLEAN2.jpg</image:loc><image:caption>TFFraudTrends2026CLEAN2</image:caption><image:title>TFFraudTrends2026CLEAN2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ThreatFabric_SocialCard-1.png</image:loc><image:caption>ThreatFabricSocialCard1</image:caption><image:title>ThreatFabricSocialCard1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MTI_Blog_Sturnus3.jpg</image:loc><image:caption>MTIBlogSturnus3</image:caption><image:title>MTIBlogSturnus3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FRS_Synergy-1.png</image:loc><image:caption>TFFRSSynergy1</image:caption><image:title>TFFRSSynergy1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/gartner-logo-white.svg</image:loc><image:caption>gartnerlogowhite</image:caption><image:title>gartnerlogowhite</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/5stars.png</image:loc><image:caption>5stars</image:caption><image:title>5stars</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Website_Flags.png</image:loc><image:caption>TFWebsiteFlags</image:caption><image:title>TFWebsiteFlags</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2025-02-26</lastmod></url><url><loc>https://www.threatfabric.com/blogs/romance-fraud-vs-fraud-kill-chain</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-03-04%20at%2008.51.20.png</image:loc><image:caption>Screenshot20240304at085120</image:caption><image:title>Screenshot20240304at085120</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-03-04%20at%2008.52.32.png</image:loc><image:caption>Screenshot20240304at085232</image:caption><image:title>Screenshot20240304at085232</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_CyberfraudKillchain_RomanceFraud_Details.png</image:loc><image:caption>TFCyberfraudKillchainRomanceFraudDetails</image:caption><image:title>TFCyberfraudKillchainRomanceFraudDetails</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-03-04%20at%2008.52.04.png</image:loc><image:caption>Screenshot20240304at085204</image:caption><image:title>Screenshot20240304at085204</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_CyberfraudKillchain_RomanceFraud_FeaturedImage.png</image:loc><image:caption>TFCyberfraudKillchainRomanceFraudFeaturedImage</image:caption><image:title>TFCyberfraudKillchainRomanceFraudFeaturedImage</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2024-03-06</lastmod></url><url><loc>https://www.threatfabric.com/resources/fraud-by-malware</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-recognized-by-gartner-as-cyber-fraud-fusion-kill-chain-vendor</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2023-09-15</lastmod></url><url><loc>https://www.threatfabric.com/blogs/a-multi-layered-approach-to-detecting-impersonation-scams</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_DetectingImpersonationScams.jpg</image:loc><image:caption>TFDetectingImpersonationScams</image:caption><image:title>TFDetectingImpersonationScams</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/20240924_Blog.jpg</image:loc><image:caption>20240924Blog</image:caption><image:title>20240924Blog</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2024-09-25</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-2-threat-intelligence-collaboration-and-community-with-teresa-walsh</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_TeresaWalsh.png</image:loc><image:caption>TFFusionFiresideTeresaWalsh</image:caption><image:title>TFFusionFiresideTeresaWalsh</image:title></image:image><lastmod>2024-10-31</lastmod></url><url><loc>https://www.threatfabric.com/blogs/crocodilus-mobile-malware-evolving-fast-going-global</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_LightningWebinars_Blog.jpg</image:loc><image:caption>TFLightningWebinarsBlog</image:caption><image:title>TFLightningWebinarsBlog</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/crypto-regex.png</image:loc><image:caption>cryptoregex</image:caption><image:title>cryptoregex</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/croco-goes-global.png</image:loc><image:caption>crocogoesglobal</image:caption><image:title>crocogoesglobal</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/facebook-ad-pl.png</image:loc><image:caption>facebookadpl</image:caption><image:title>facebookadpl</image:title></image:image><lastmod>2025-06-03</lastmod></url><url><loc>https://www.threatfabric.com/blogs/new_android_trojan_targeting_over_60_banks_and_social_apps</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-android-trojan/new_android_trojan_targeting_over_60_banks_and_social_apps_forum_post_of_red_alert_actor_on_bot_update.webp</image:loc><image:caption>newandroidtrojantargetingover60banksandsocialappsforumpostofredalertactoronbotupdate</image:caption><image:title>newandroidtrojantargetingover60banksandsocialappsforumpostofredalertactoronbotupdate</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-android-trojan/new_android_trojan_targeting_over_60_banks_and_social_apps_salt_code_snippet.png</image:loc><image:caption>newandroidtrojantargetingover60banksandsocialappssaltcodesnippet</image:caption><image:title>newandroidtrojantargetingover60banksandsocialappssaltcodesnippet</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-android-trojan/new_android_trojan_targeting_over_60_banks_and_social_apps_c2_server_address_code_snippet.webp</image:loc><image:caption>newandroidtrojantargetingover60banksandsocialappsc2serveraddresscodesnippet</image:caption><image:title>newandroidtrojantargetingover60banksandsocialappsc2serveraddresscodesnippet</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-android-trojan/new_android_trojan_targeting_over_60_banks_and_social_apps_twitter_handle_code_snippet.webp</image:loc><image:caption>newandroidtrojantargetingover60banksandsocialappstwitterhandlecodesnippet</image:caption><image:title>newandroidtrojantargetingover60banksandsocialappstwitterhandlecodesnippet</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-android-trojan/new_android_trojan_targeting_over_60_banks_and_social_apps_new_attack_vectors.webp</image:loc><image:caption>newandroidtrojantargetingover60banksandsocialappsnewattackvectors</image:caption><image:title>newandroidtrojantargetingover60banksandsocialappsnewattackvectors</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-android-trojan/new_android_trojan_targeting_over_60_banks_and_social_apps_red_alert_2.webp</image:loc><image:caption>newandroidtrojantargetingover60banksandsocialappsredalert2</image:caption><image:title>newandroidtrojantargetingover60banksandsocialappsredalert2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-android-trojan/codes.png</image:loc><image:caption>codes</image:caption><image:title>codes</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/xenomorph-v3-a-new-variant-with-ats-targeting-more-than-400-institutions</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenomorph-v3/ad.png</image:loc><image:caption>ad</image:caption><image:title>ad</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenomorph-v3/ats-condition.png</image:loc><image:caption>atscondition</image:caption><image:title>atscondition</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenomorph-v3/hadoken.png</image:loc><image:caption>hadoken</image:caption><image:title>hadoken</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenomorph-v3/cookies.png</image:loc><image:caption>cookies</image:caption><image:title>cookies</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/cover-2.png</image:loc><image:caption>cover2</image:caption><image:title>cover2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenomorph-v3/authenticator.png</image:loc><image:caption>authenticator</image:caption><image:title>authenticator</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenomorph-v3/zombinder.png</image:loc><image:caption>zombinder</image:caption><image:title>zombinder</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenomorph-v3/targets-02.png</image:loc><image:caption>targets02</image:caption><image:title>targets02</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenomorph-v3/cdn.png</image:loc><image:caption>cdn</image:caption><image:title>cdn</image:title></image:image><lastmod>2023-06-27</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-11-from-compliance-to-collaboration-with-keith-gross</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_KeithGross.jpg</image:loc><image:caption>TFFusionFiresideKeithGross</image:caption><image:title>TFFusionFiresideKeithGross</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2025-06-17</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-appoints-maurits-lucas-as-vp-of-sales-engineering-product-marketing</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Team_Maurits.png</image:loc><image:caption>TFTeamMaurits</image:caption><image:title>TFTeamMaurits</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-10-11</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-appoints-jacqueline-nijzink-as-chief-operating-officer</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/MicrosoftTeams-image%20(74).png</image:loc><image:caption>MicrosoftTeamsimage74</image:caption><image:title>MicrosoftTeamsimage74</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-11-09</lastmod></url><url><loc>https://www.threatfabric.com/jobs</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image%20(1).png</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2025-01-13</lastmod></url><url><loc>https://www.threatfabric.com/mti</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/ThreatFabric_SocialCard-1.png</image:loc><image:caption>ThreatFabricSocialCard1</image:caption><image:title>ThreatFabricSocialCard1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_WebsiteAssets_MTI_Integrations.png</image:loc><image:caption>TFWebsiteAssetsMTIIntegrations</image:caption><image:title>TFWebsiteAssetsMTIIntegrations</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202025-01-09%20at%2011.55.05.png</image:loc><image:caption>Screenshot20250109at115505</image:caption><image:title>Screenshot20250109at115505</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/harry_tf_a_business_man_walking_through_a_tunnel_of_hope_in_a_c_9ee25930-a27b-4992-b321-1bae54c8bacc-topaz-standard%20v2-3840w.jpg</image:loc><image:caption>harrytfabusinessmanwalkingthroughatunnelofhopeinac9ee25930a27b4992b3211bae54c8bacctopazstandardv23840w</image:caption><image:title>harrytfabusinessmanwalkingthroughatunnelofhopeinac9ee25930a27b4992b3211bae54c8bacctopazstandardv23840w</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MTI_Portal2.png</image:loc><image:caption>MTIPortal2</image:caption><image:title>MTIPortal2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MTI_Portal1.png</image:loc><image:caption>MTIPortal1</image:caption><image:title>MTIPortal1</image:title></image:image><lastmod>2025-01-13</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-special-psr-edition-with-our-guest-chris-bone</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_ChrisBone.jpg</image:loc><image:caption>TFFusionFiresideChrisBone</image:caption><image:title>TFFusionFiresideChrisBone</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2024-10-31</lastmod></url><url><loc>https://www.threatfabric.com/blogs/pig-butchering-vs-cyber-fraud-kill-chain</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_CyberfraudKillchain_PigButchering_FeaturedImage.jpg</image:loc><image:caption>TFCyberfraudKillchainPigButcheringFeaturedImage</image:caption><image:title>TFCyberfraudKillchainPigButcheringFeaturedImage</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_CyberfraudKillchain_PigButchering_Details.jpg</image:loc><image:caption>TFCyberfraudKillchainPigButcheringDetails</image:caption><image:title>TFCyberfraudKillchainPigButcheringDetails</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-06-11%20at%2015.14.32.png</image:loc><image:caption>Screenshot20240611at151432</image:caption><image:title>Screenshot20240611at151432</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-03-04%20at%2008.52.04.png</image:loc><image:caption>Screenshot20240304at085204</image:caption><image:title>Screenshot20240304at085204</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2024-06-12</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-investment-announcement</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/investment-announcement/investmentannoncement-detail.png</image:loc><image:caption>investmentannoncementdetail</image:caption><image:title>investmentannoncementdetail</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/investment-announcement/invesmentanouncement.png</image:loc><image:caption>invesmentanouncement</image:caption><image:title>invesmentanouncement</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/ghost-tap-new-cash-out-tactic-with-nfc-relay</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_GhostTap_LOGO.jpg</image:loc><image:caption>TFGhostTapLOGO</image:caption><image:title>TFGhostTapLOGO</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image-png-Nov-12-2024-10-27-58-2276-AM.png</image:loc><image:caption>imagepngNov1220241027582276AM</image:caption><image:title>imagepngNov1220241027582276AM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MTI_NFC_relay_flow.png</image:loc><image:caption>MTINFCrelayflow</image:caption><image:title>MTINFCrelayflow</image:title></image:image><lastmod>2024-11-20</lastmod></url><url><loc>https://www.threatfabric.com/blogs/2020_year_of_the_rat</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2020-year-of-the-rat/hydra_overlays.png</image:loc><image:caption>hydraoverlays</image:caption><image:title>hydraoverlays</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2020-year-of-the-rat/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2020-year-of-the-rat/anubis_rat_post.png</image:loc><image:caption>anubisratpost</image:caption><image:title>anubisratpost</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2020-year-of-the-rat/Screenshot%202023-03-03%20at%2011.10.58%20AM.png</image:loc><image:caption>Screenshot20230303at111058AM</image:caption><image:title>Screenshot20230303at111058AM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2020-year-of-the-rat/australian_browser_overlay.png</image:loc><image:caption>australianbrowseroverlay</image:caption><image:title>australianbrowseroverlay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2020-year-of-the-rat/google_authenticator.jpg</image:loc><image:caption>googleauthenticator</image:caption><image:title>googleauthenticator</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-16-nearly-28-years-on-the-front-line-of-fraud-with-anton-jan-cozijnsen</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_AntonJanCozijnsen.jpg</image:loc><image:caption>TFFusionFiresideAntonJanCozijnsen</image:caption><image:title>TFFusionFiresideAntonJanCozijnsen</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2026-02-18</lastmod></url><url><loc>https://www.threatfabric.com/blogs/exposing-crocodilus-new-device-takeover-malware-targeting-android-devices</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/device_tag.png</image:loc><image:caption>devicetag</image:caption><image:title>devicetag</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/crypto_message_cut.png</image:loc><image:caption>cryptomessagecut</image:caption><image:title>cryptomessagecut</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/debug_mesages.png</image:loc><image:caption>debugmesages</image:caption><image:title>debugmesages</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Blog_Crocodilus.jpg</image:loc><image:caption>TFBlogCrocodilus</image:caption><image:title>TFBlogCrocodilus</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide2-2.jpeg</image:loc><image:caption>Slide22</image:caption><image:title>Slide22</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide3-2.jpeg</image:loc><image:caption>Slide32</image:caption><image:title>Slide32</image:title></image:image><lastmod>2025-03-31</lastmod></url><url><loc>https://www.threatfabric.com/fusion-fireside</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_HakonAkerlund.jpg</image:loc><image:caption>TFFusionFiresideHakonAkerlund</image:caption><image:title>TFFusionFiresideHakonAkerlund</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_MortenTandle.jpg</image:loc><image:caption>TFFusionFiresideMortenTandle</image:caption><image:title>TFFusionFiresideMortenTandle</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_PatrickBours.jpg</image:loc><image:caption>TFFusionFiresidePatrickBours</image:caption><image:title>TFFusionFiresidePatrickBours</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Eward_Faded.png</image:loc><image:caption>TFEwardFaded</image:caption><image:title>TFEwardFaded</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_FreddyArthur.png</image:loc><image:caption>TFFusionFiresideFreddyArthur</image:caption><image:title>TFFusionFiresideFreddyArthur</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_KeithGross.jpg</image:loc><image:caption>TFFusionFiresideKeithGross</image:caption><image:title>TFFusionFiresideKeithGross</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_FeaturedImage.jpg</image:loc><image:caption>TFFusionFiresideFeaturedImage</image:caption><image:title>TFFusionFiresideFeaturedImage</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_SenanMoloney.jpg</image:loc><image:caption>TFFusionFiresideSenanMoloney</image:caption><image:title>TFFusionFiresideSenanMoloney</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_ChrisBone.jpg</image:loc><image:caption>TFFusionFiresideChrisBone</image:caption><image:title>TFFusionFiresideChrisBone</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_JakeNorwood.jpg</image:loc><image:caption>TFFusionFiresideJakeNorwood</image:caption><image:title>TFFusionFiresideJakeNorwood</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_TeresaWalsh.png</image:loc><image:caption>TFFusionFiresideTeresaWalsh</image:caption><image:title>TFFusionFiresideTeresaWalsh</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_CraigRice.png</image:loc><image:caption>TFFusionFiresideCraigRice</image:caption><image:title>TFFusionFiresideCraigRice</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_DaveLaramy%201-1.jpg</image:loc><image:caption>TFFusionFiresideDaveLaramy11</image:caption><image:title>TFFusionFiresideDaveLaramy11</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_Announcement3.png</image:loc><image:caption>TFFusionFiresideAnnouncement3</image:caption><image:title>TFFusionFiresideAnnouncement3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_FrederikMennes.jpg</image:loc><image:caption>TFFusionFiresideFrederikMennes</image:caption><image:title>TFFusionFiresideFrederikMennes</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_KeithGordon.jpg</image:loc><image:caption>TFFusionFiresideKeithGordon</image:caption><image:title>TFFusionFiresideKeithGordon</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_JohnFokker.jpg</image:loc><image:caption>TFFusionFiresideJohnFokker</image:caption><image:title>TFFusionFiresideJohnFokker</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_AntonJanCozijnsen.jpg</image:loc><image:caption>TFFusionFiresideAntonJanCozijnsen</image:caption><image:title>TFFusionFiresideAntonJanCozijnsen</image:title></image:image><lastmod>2026-02-19</lastmod></url><url><loc>https://www.threatfabric.com/blogs/datzbro-rat-hiding-behind-senior-travel-scams</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/schematic_mode.png</image:loc><image:caption>schematicmode</image:caption><image:title>schematicmode</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide1-Sep-25-2025-09-21-45-6538-PM.png</image:loc><image:caption>Slide1Sep2520250921456538PM</image:caption><image:title>Slide1Sep2520250921456538PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide4-Sep-25-2025-09-21-45-6182-PM.png</image:loc><image:caption>Slide4Sep2520250921456182PM</image:caption><image:title>Slide4Sep2520250921456182PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/scam_alert.png</image:loc><image:caption>scamalert</image:caption><image:title>scamalert</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/black_screen_density_semi.png</image:loc><image:caption>blackscreendensitysemi</image:caption><image:title>blackscreendensitysemi</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/samples.png</image:loc><image:caption>samples</image:caption><image:title>samples</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide2-Sep-25-2025-09-21-46-6322-PM.png</image:loc><image:caption>Slide2Sep2520250921466322PM</image:caption><image:title>Slide2Sep2520250921466322PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/panel_translated.png</image:loc><image:caption>paneltranslated</image:caption><image:title>paneltranslated</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide3-Sep-25-2025-09-21-45-9714-PM.png</image:loc><image:caption>Slide3Sep2520250921459714PM</image:caption><image:title>Slide3Sep2520250921459714PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/panel.png</image:loc><image:caption>panel</image:caption><image:title>panel</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Datzbro.jpg</image:loc><image:caption>TFDatzbro</image:caption><image:title>TFDatzbro</image:title></image:image><lastmod>2025-09-30</lastmod></url><url><loc>https://www.threatfabric.com/blogs</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cover%20(1)-1.png</image:loc><image:caption>cover11</image:caption><image:title>cover11</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Andy%20Chandler.png</image:loc><image:caption>AndyChandler</image:caption><image:title>AndyChandler</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_IPTV4.jpg</image:loc><image:caption>TFIPTV4</image:caption><image:title>TFIPTV4</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_MortenTandle.jpg</image:loc><image:caption>TFFusionFiresideMortenTandle</image:caption><image:title>TFFusionFiresideMortenTandle</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Look-out-for-Octos-tentacles/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/InvestmentFraud_FeaturedImage@2x-1.png</image:loc><image:caption>InvestmentFraudFeaturedImage2x1</image:caption><image:title>InvestmentFraudFeaturedImage2x1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Blog_FrontDoor.jpg</image:loc><image:caption>TFBlogFrontDoor</image:caption><image:title>TFBlogFrontDoor</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/harry_tf_miyazaki_style_image_of_jellyfish_playing_tug-of-war_w_00f220c1-9dd8-44e8-9367-e3e18b0485bc.jpg</image:loc><image:caption>harrytfmiyazakistyleimageofjellyfishplayingtugofwarw00f220c19dd844e89367e3e18b0485bc</image:caption><image:title>harrytfmiyazakistyleimageofjellyfishplayingtugofwarw00f220c19dd844e89367e3e18b0485bc</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_GhostTap_LOGO.jpg</image:loc><image:caption>TFGhostTapLOGO</image:caption><image:title>TFGhostTapLOGO</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/investment-announcement/invesmentanouncement.png</image:loc><image:caption>invesmentanouncement</image:caption><image:title>invesmentanouncement</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_FreddyArthur.png</image:loc><image:caption>TFFusionFiresideFreddyArthur</image:caption><image:title>TFFusionFiresideFreddyArthur</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Chameleon.jpg</image:loc><image:caption>TFChameleon</image:caption><image:title>TFChameleon</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_DaveLaramy%201-1.jpg</image:loc><image:caption>TFFusionFiresideDaveLaramy11</image:caption><image:title>TFFusionFiresideDaveLaramy11</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_FrederikMennes.jpg</image:loc><image:caption>TFFusionFiresideFrederikMennes</image:caption><image:title>TFFusionFiresideFrederikMennes</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/spyware.png</image:loc><image:caption>spyware</image:caption><image:title>spyware</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_KeithGordon.jpg</image:loc><image:caption>TFFusionFiresideKeithGordon</image:caption><image:title>TFFusionFiresideKeithGordon</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MTI_Blog_Herodotus2.jpg</image:loc><image:caption>MTIBlogHerodotus2</image:caption><image:title>MTIBlogHerodotus2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_KenPalla_ClarityOnAustralianScamRegulations_SOCIAL.jpg</image:loc><image:caption>TFKenPallaClarityOnAustralianScamRegulationsSOCIAL</image:caption><image:title>TFKenPallaClarityOnAustralianScamRegulationsSOCIAL</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_SenanMoloney.jpg</image:loc><image:caption>TFFusionFiresideSenanMoloney</image:caption><image:title>TFFusionFiresideSenanMoloney</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_LightningWebinars_Blog.jpg</image:loc><image:caption>TFLightningWebinarsBlog</image:caption><image:title>TFLightningWebinarsBlog</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/PSR_Social1.jpg</image:loc><image:caption>PSRSocial1</image:caption><image:title>PSRSocial1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/20240924_Blog.jpg</image:loc><image:caption>20240924Blog</image:caption><image:title>20240924Blog</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/cover-3.png</image:loc><image:caption>cover3</image:caption><image:title>cover3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_TechRequirements.jpg</image:loc><image:caption>TFTechRequirements</image:caption><image:title>TFTechRequirements</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_KeithGross.jpg</image:loc><image:caption>TFFusionFiresideKeithGross</image:caption><image:title>TFFusionFiresideKeithGross</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_JohnFokker.jpg</image:loc><image:caption>TFFusionFiresideJohnFokker</image:caption><image:title>TFFusionFiresideJohnFokker</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Anatsa_Blog2.png</image:loc><image:caption>TFAnatsaBlog2</image:caption><image:title>TFAnatsaBlog2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cover-2.jpg</image:loc><image:caption>cover2</image:caption><image:title>cover2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_GoogleStreet.jpg</image:loc><image:caption>TFGoogleStreet</image:caption><image:title>TFGoogleStreet</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_RaboInvestments_SOCIAL%201.png</image:loc><image:caption>TFRaboInvestmentsSOCIAL1</image:caption><image:title>TFRaboInvestmentsSOCIAL1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MicrosoftTeams-image%20(74).png</image:loc><image:caption>MicrosoftTeamsimage74</image:caption><image:title>MicrosoftTeamsimage74</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_MTI_PhantomCard.jpg</image:loc><image:caption>TFMTIPhantomCard</image:caption><image:title>TFMTIPhantomCard</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Lightning%20Campaign%207.2%20-%20Behavioral%20Analytics_Privacy.jpg</image:loc><image:caption>LightningCampaign72BehavioralAnalyticsPrivacy</image:caption><image:title>LightningCampaign72BehavioralAnalyticsPrivacy</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/partners-in-crime/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Gartner_January2024.png</image:loc><image:caption>TFGartnerJanuary2024</image:caption><image:title>TFGartnerJanuary2024</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MTI_Blog_Sturnus3.jpg</image:loc><image:caption>MTIBlogSturnus3</image:caption><image:title>MTIBlogSturnus3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_JakeNorwood.jpg</image:loc><image:caption>TFFusionFiresideJakeNorwood</image:caption><image:title>TFFusionFiresideJakeNorwood</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FraudTrends2026_CLEAN2.jpg</image:loc><image:caption>TFFraudTrends2026CLEAN2</image:caption><image:title>TFFraudTrends2026CLEAN2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/sova/cover.png</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Anatsa_BlogUSA.jpg</image:loc><image:caption>TFAnatsaBlogUSA</image:caption><image:title>TFAnatsaBlogUSA</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Blog_Letscall.jpg</image:loc><image:caption>TFBlogLetscall</image:caption><image:title>TFBlogLetscall</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ThreatFabric_SocialCard.png</image:loc><image:caption>ThreatFabricSocialCard</image:caption><image:title>ThreatFabricSocialCard</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_LightSpyiOS.jpg</image:loc><image:caption>TFLightSpyiOS</image:caption><image:title>TFLightSpyiOS</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/harry_tf_miyazaki_style_image_of_Rocinante_trojan_horse_with_wi_e5df5bee-17f2-4b62-a14c-776da7c6a06f.jpg</image:loc><image:caption>harrytfmiyazakistyleimageofRocinantetrojanhorsewithwie5df5bee17f24b62a14c776da7c6a06f</image:caption><image:title>harrytfmiyazakistyleimageofRocinantetrojanhorsewithwie5df5bee17f24b62a14c776da7c6a06f</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Lightning%20Campaign%207.1%20-%20Behavioral%20Analytics_Scams.jpg</image:loc><image:caption>LightningCampaign71BehavioralAnalyticsScams</image:caption><image:title>LightningCampaign71BehavioralAnalyticsScams</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image%20(2).png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Bull.jpg</image:loc><image:caption>TFBull</image:caption><image:title>TFBull</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_HologramLaptop_16-9%20(1).png</image:loc><image:caption>TFHologramLaptop1691</image:caption><image:title>TFHologramLaptop1691</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_HakonAkerlund.jpg</image:loc><image:caption>TFFusionFiresideHakonAkerlund</image:caption><image:title>TFFusionFiresideHakonAkerlund</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MTI_Perseus.jpg</image:loc><image:caption>MTIPerseus</image:caption><image:title>MTIPerseus</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/tf_blog_ba.jpg</image:loc><image:caption>tfblogba</image:caption><image:title>tfblogba</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_PressRelease_Onespan2.jpg</image:loc><image:caption>TFPressReleaseOnespan2</image:caption><image:title>TFPressReleaseOnespan2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Team_Maurits.png</image:loc><image:caption>TFTeamMaurits</image:caption><image:title>TFTeamMaurits</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_Announcement3.png</image:loc><image:caption>TFFusionFiresideAnnouncement3</image:caption><image:title>TFFusionFiresideAnnouncement3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Blog_Crocodilus.jpg</image:loc><image:caption>TFBlogCrocodilus</image:caption><image:title>TFBlogCrocodilus</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cover.jpg</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Datzbro.jpg</image:loc><image:caption>TFDatzbro</image:caption><image:title>TFDatzbro</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_GaryWarner.jpg</image:loc><image:caption>TFFusionFiresideGaryWarner</image:caption><image:title>TFFusionFiresideGaryWarner</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/APP%20Fraud%20Reimbursement%20in%20the%20UK.png</image:loc><image:caption>APPFraudReimbursementintheUK</image:caption><image:title>APPFraudReimbursementintheUK</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MicrosoftTeams-image%20(113).png</image:loc><image:caption>MicrosoftTeamsimage113</image:caption><image:title>MicrosoftTeamsimage113</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_LightSpy-1.jpg</image:loc><image:caption>TFLightSpy1</image:caption><image:title>TFLightSpy1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/tf_q2_2022_mobilethreatlandscape_sheetsize.001.jpeg</image:loc><image:caption>tfq22022mobilethreatlandscapesheetsize001</image:caption><image:title>tfq22022mobilethreatlandscapesheetsize001</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MicrosoftTeams-image%20(38).png</image:loc><image:caption>MicrosoftTeamsimage38</image:caption><image:title>MicrosoftTeamsimage38</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_CyberfraudKillchain_MobileBankingMalware.png</image:loc><image:caption>TFCyberfraudKillchainMobileBankingMalware</image:caption><image:title>TFCyberfraudKillchainMobileBankingMalware</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/PR-Threat-fabric-1-1.jpg</image:loc><image:caption>PRThreatfabric11</image:caption><image:title>PRThreatfabric11</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/social-suggested-images/TF_AndroidDroppers2.jpg</image:loc><image:caption>TFAndroidDroppers2</image:caption><image:title>TFAndroidDroppers2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_HyenaHologram.jpg</image:loc><image:caption>TFHyenaHologram</image:caption><image:title>TFHyenaHologram</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/cover-2.png</image:loc><image:caption>cover2</image:caption><image:title>cover2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/tf_core_story_2022_chs_v1.6.025.jpeg</image:loc><image:caption>tfcorestory2022chsv16025</image:caption><image:title>tfcorestory2022chsv16025</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_ChrisBone.jpg</image:loc><image:caption>TFFusionFiresideChrisBone</image:caption><image:title>TFFusionFiresideChrisBone</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Octo2.jpg</image:loc><image:caption>TFOcto2</image:caption><image:title>TFOcto2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_CraigRice.png</image:loc><image:caption>TFFusionFiresideCraigRice</image:caption><image:title>TFFusionFiresideCraigRice</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/harry_tf_researcher_sitting_behind_desk_in_front_of_giant_glass_b54cab5e-4166-4c7e-9757-1aa42d2fe360.jpg</image:loc><image:caption>harrytfresearchersittingbehinddeskinfrontofgiantglassb54cab5e41664c7e97571aa42d2fe360</image:caption><image:title>harrytfresearchersittingbehinddeskinfrontofgiantglassb54cab5e41664c7e97571aa42d2fe360</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Team_Eward.jpg</image:loc><image:caption>TFTeamEward</image:caption><image:title>TFTeamEward</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ShiftLeftOnFraud_FeaturedImage2.jpg</image:loc><image:caption>ShiftLeftOnFraudFeaturedImage2</image:caption><image:title>ShiftLeftOnFraudFeaturedImage2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_MTI_RatOn-01.jpg</image:loc><image:caption>TFMTIRatOn01</image:caption><image:title>TFMTIRatOn01</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenamorph/cover.png</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_CyberfraudKillchain_VishingRATFraud_FeaturedImage.png</image:loc><image:caption>TFCyberfraudKillchainVishingRATFraudFeaturedImage</image:caption><image:title>TFCyberfraudKillchainVishingRATFraudFeaturedImage</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_PatrickBours.jpg</image:loc><image:caption>TFFusionFiresidePatrickBours</image:caption><image:title>TFFusionFiresidePatrickBours</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Team_Emma.jpg</image:loc><image:caption>TFTeamEmma</image:caption><image:title>TFTeamEmma</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_CyberfraudKillchain_RomanceFraud_FeaturedImage.png</image:loc><image:caption>TFCyberfraudKillchainRomanceFraudFeaturedImage</image:caption><image:title>TFCyberfraudKillchainRomanceFraudFeaturedImage</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_AntonJanCozijnsen.jpg</image:loc><image:caption>TFFusionFiresideAntonJanCozijnsen</image:caption><image:title>TFFusionFiresideAntonJanCozijnsen</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/ermac/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/harry_tf_money_coins_in_well_miyazaki_style_drawing_of_water_we_0237f000-5c27-4a04-bb8c-864f66d32459.jpg</image:loc><image:caption>harrytfmoneycoinsinwellmiyazakistyledrawingofwaterwe0237f0005c274a04bb8c864f66d32459</image:caption><image:title>harrytfmoneycoinsinwellmiyazakistyledrawingofwaterwe0237f0005c274a04bb8c864f66d32459</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cover%20(1).png</image:loc><image:caption>cover1</image:caption><image:title>cover1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cover.png</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blogpost-placeholder.png</image:loc><image:caption>blogpostplaceholder</image:caption><image:title>blogpostplaceholder</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/brasdex-cover-minified.png</image:loc><image:caption>brasdexcoverminified</image:caption><image:title>brasdexcoverminified</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Inform_PartnershipAnnouncement_SOCIAL.jpg</image:loc><image:caption>InformPartnershipAnnouncementSOCIAL</image:caption><image:title>InformPartnershipAnnouncementSOCIAL</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Lightning%20Campaign%207%20-%20Behavioral%20Analytics_MobileMalware-1.jpg</image:loc><image:caption>LightningCampaign7BehavioralAnalyticsMobileMalware1</image:caption><image:title>LightningCampaign7BehavioralAnalyticsMobileMalware1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cover-1.jpg</image:loc><image:caption>cover1</image:caption><image:title>cover1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_TeresaWalsh.png</image:loc><image:caption>TFFusionFiresideTeresaWalsh</image:caption><image:title>TFFusionFiresideTeresaWalsh</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF%20x%20Trapets%20Design%20Logo.png</image:loc><image:caption>TFxTrapetsDesignLogo</image:caption><image:title>TFxTrapetsDesignLogo</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_SecuriDropper_Social.jpg</image:loc><image:caption>TFSecuriDropperSocial</image:caption><image:title>TFSecuriDropperSocial</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_CyberfraudKillchain_PigButchering_FeaturedImage.jpg</image:loc><image:caption>TFCyberfraudKillchainPigButcheringFeaturedImage</image:caption><image:title>TFCyberfraudKillchainPigButcheringFeaturedImage</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Chameleon_2024.jpg</image:loc><image:caption>TFChameleon2024</image:caption><image:title>TFChameleon2024</image:title></image:image><lastmod>2024-09-03</lastmod></url><url><loc>https://www.threatfabric.com/blogs/android-droppers-the-silent-gatekeepers-of-malware</loc><video:video><video:thumbnail_loc>https://www.threatfabric.com/hubfs/App_Installed_Via_Dropper.mov/medium.jpg</video:thumbnail_loc><video:title>Example of app installation through dropper app</video:title><video:description>Example of app installation through dropper app</video:description><video:content_loc>https://www.threatfabric.com/hubfs/App_Installed_Via_Dropper.mov</video:content_loc><video:duration>24</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image-png-Aug-14-2025-07-36-03-8463-AM.png</image:loc><image:caption>imagepngAug1420250736038463AM</image:caption><image:title>imagepngAug1420250736038463AM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image-png-Aug-25-2025-07-24-00-6500-AM.png</image:loc><image:caption>imagepngAug2520250724006500AM</image:caption><image:title>imagepngAug2520250724006500AM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/App_blocked-2.png</image:loc><image:caption>Appblocked2</image:caption><image:title>Appblocked2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/social-suggested-images/TF_AndroidDroppers2.jpg</image:loc><image:caption>TFAndroidDroppers2</image:caption><image:title>TFAndroidDroppers2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image-png-Aug-22-2025-08-37-31-7983-AM.png</image:loc><image:caption>imagepngAug2220250837317983AM</image:caption><image:title>imagepngAug2220250837317983AM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2025-08-27</lastmod></url><url><loc>https://www.threatfabric.com/blogs/xenomorph-a-newly-hatched-banking-trojan</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenamorph/a11y.webp</image:loc><image:caption>a11y</image:caption><image:title>a11y</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenamorph/cover.png</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenamorph/code_reuse.webp</image:loc><image:caption>codereuse</image:caption><image:title>codereuse</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenamorph/gp_dropper.webp</image:loc><image:caption>gpdropper</image:caption><image:title>gpdropper</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenamorph/overlays.webp</image:loc><image:caption>overlays</image:caption><image:title>overlays</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenamorph/features.webp</image:loc><image:caption>features</image:caption><image:title>features</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/xenamorph/ring0.webp</image:loc><image:caption>ring0</image:caption><image:title>ring0</image:title></image:image><lastmod>2023-06-27</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-appoints-rohan-mer-as-regional-account-director</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/MicrosoftTeams-image%20(113).png</image:loc><image:caption>MicrosoftTeamsimage113</image:caption><image:title>MicrosoftTeamsimage113</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2024-02-09</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-7-a-conversation-with-dave-laramy-from-danske-bank</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_DaveLaramy%201-1.jpg</image:loc><image:caption>TFFusionFiresideDaveLaramy11</image:caption><image:title>TFFusionFiresideDaveLaramy11</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-appoints-eward-driehuis-as-vp-of-fraud-engineering</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Team_Eward.jpg</image:loc><image:caption>TFTeamEward</image:caption><image:title>TFTeamEward</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2023-09-15</lastmod></url><url><loc>https://www.threatfabric.com/blogs/xenomorph</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide3-1.png</image:loc><image:caption>Slide31</image:caption><image:title>Slide31</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Bull.jpg</image:loc><image:caption>TFBull</image:caption><image:title>TFBull</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide6.png</image:loc><image:caption>Slide6</image:caption><image:title>Slide6</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide1-1.png</image:loc><image:caption>Slide11</image:caption><image:title>Slide11</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide3-3.png</image:loc><image:caption>Slide33</image:caption><image:title>Slide33</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide5-2.png</image:loc><image:caption>Slide52</image:caption><image:title>Slide52</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide5-1.png</image:loc><image:caption>Slide51</image:caption><image:title>Slide51</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide7.png</image:loc><image:caption>Slide7</image:caption><image:title>Slide7</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide4-2.png</image:loc><image:caption>Slide42</image:caption><image:title>Slide42</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide4-1.png</image:loc><image:caption>Slide41</image:caption><image:title>Slide41</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide2-1.png</image:loc><image:caption>Slide21</image:caption><image:title>Slide21</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide6-1.png</image:loc><image:caption>Slide61</image:caption><image:title>Slide61</image:title></image:image><lastmod>2023-11-07</lastmod></url><url><loc>https://www.threatfabric.com/blogs/clarity-on-australian-scam-regulations</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/KenPalla.png</image:loc><image:caption>KenPalla</image:caption><image:title>KenPalla</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_KenPalla_ClarityOnAustralianScamRegulations_SOCIAL.jpg</image:loc><image:caption>TFKenPallaClarityOnAustralianScamRegulationsSOCIAL</image:caption><image:title>TFKenPallaClarityOnAustralianScamRegulationsSOCIAL</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2024-10-15</lastmod></url><url><loc>https://www.threatfabric.com/blogs/android-banking-trojan-chameleon-is-back-in-action</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/image-png-Dec-06-2023-07-04-29-4927-PM.png</image:loc><image:caption>imagepngDec0620230704294927PM</image:caption><image:title>imagepngDec0620230704294927PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image-png-Dec-07-2023-10-11-01-9565-AM.png</image:loc><image:caption>imagepngDec0720231011019565AM</image:caption><image:title>imagepngDec0720231011019565AM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image-png-Nov-29-2023-04-31-16-9294-PM.png</image:loc><image:caption>imagepngNov2920230431169294PM</image:caption><image:title>imagepngNov2920230431169294PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Chameleon.jpg</image:loc><image:caption>TFChameleon</image:caption><image:title>TFChameleon</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image-png-Dec-13-2023-09-01-56-4869-PM.png</image:loc><image:caption>imagepngDec1320230901564869PM</image:caption><image:title>imagepngDec1320230901564869PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2024-01-03</lastmod></url><url><loc>https://www.threatfabric.com/privacy</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2026-04-01</lastmod></url><url><loc>https://www.threatfabric.com/blogs/behavioural-analytics-privacy-and-regulation</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Lightning%20Campaign%207.2%20-%20Behavioral%20Analytics_Privacy.jpg</image:loc><image:caption>LightningCampaign72BehavioralAnalyticsPrivacy</image:caption><image:title>LightningCampaign72BehavioralAnalyticsPrivacy</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202025-04-02%20at%2010.55.25.png</image:loc><image:caption>Screenshot20250402at105525</image:caption><image:title>Screenshot20250402at105525</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Blof%202%20image%20.png</image:loc><image:caption>Blof2image</image:caption><image:title>Blof2image</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2025-04-08</lastmod></url><url><loc>https://www.threatfabric.com/scam-prevention-in-the-nordics-with-behavioural-analytics</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/synergy.png</image:loc><image:caption>synergy</image:caption><image:title>synergy</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-12-10%20at%2015.27.42.png</image:loc><image:caption>Screenshot20241210at152742</image:caption><image:title>Screenshot20241210at152742</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ThreatFabric_SocialCard-1.png</image:loc><image:caption>ThreatFabricSocialCard1</image:caption><image:title>ThreatFabricSocialCard1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ScamCreature.jpg</image:loc><image:caption>ScamCreature</image:caption><image:title>ScamCreature</image:title></image:image><lastmod>2026-03-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/rabobank-joins-threatfabric-investors-to-accelerate-fraud-prevention-growth-through-co-creation</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_RaboInvestments_SOCIAL%201.png</image:loc><image:caption>TFRaboInvestmentsSOCIAL1</image:caption><image:title>TFRaboInvestmentsSOCIAL1</image:title></image:image><lastmod>2024-12-04</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fraud-year-in-review-what-2025-taught-us-for-2026</loc><lastmod>2025-11-12</lastmod></url><url><loc>https://www.threatfabric.com/blogs/the-rise-of-raton-from-nfc-heists-to-remote-control-and-ats</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr8.png</image:loc><image:caption>scr8</image:caption><image:title>scr8</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr2.png</image:loc><image:caption>scr2</image:caption><image:title>scr2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr11.png</image:loc><image:caption>scr11</image:caption><image:title>scr11</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr14_edit.png</image:loc><image:caption>scr14edit</image:caption><image:title>scr14edit</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr15.png</image:loc><image:caption>scr15</image:caption><image:title>scr15</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr3.png</image:loc><image:caption>scr3</image:caption><image:title>scr3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/nf3.png</image:loc><image:caption>nf3</image:caption><image:title>nf3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr9.png</image:loc><image:caption>scr9</image:caption><image:title>scr9</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr6.png</image:loc><image:caption>scr6</image:caption><image:title>scr6</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr7.png</image:loc><image:caption>scr7</image:caption><image:title>scr7</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr1_cut.png</image:loc><image:caption>scr1cut</image:caption><image:title>scr1cut</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr10.png</image:loc><image:caption>scr10</image:caption><image:title>scr10</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr4.png</image:loc><image:caption>scr4</image:caption><image:title>scr4</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/nf4.png</image:loc><image:caption>nf4</image:caption><image:title>nf4</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr12.png</image:loc><image:caption>scr12</image:caption><image:title>scr12</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr5.png</image:loc><image:caption>scr5</image:caption><image:title>scr5</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_MTI_RatOn-01.jpg</image:loc><image:caption>TFMTIRatOn01</image:caption><image:title>TFMTIRatOn01</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/Raton/scr13.png</image:loc><image:caption>scr13</image:caption><image:title>scr13</image:title></image:image><lastmod>2025-09-09</lastmod></url><url><loc>https://www.threatfabric.com/blogs/google-play-droppers</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/anatsa.webp</image:loc><image:caption>anatsa</image:caption><image:title>anatsa</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/gymdrop.webp</image:loc><image:caption>gymdrop</image:caption><image:title>gymdrop</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/us_campaigns.webp</image:loc><image:caption>uscampaigns</image:caption><image:title>uscampaigns</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/gymdrop_filtering.webp</image:loc><image:caption>gymdropfiltering</image:caption><image:title>gymdropfiltering</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/gymdrop_website.webp</image:loc><image:caption>gymdropwebsite</image:caption><image:title>gymdropwebsite</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/alien_campaigns.webp</image:loc><image:caption>aliencampaigns</image:caption><image:title>aliencampaigns</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/brunhilda_installation.webp</image:loc><image:caption>brunhildainstallation</image:caption><image:title>brunhildainstallation</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/droppers.webp</image:loc><image:caption>droppers</image:caption><image:title>droppers</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/gymdrop_update.webp</image:loc><image:caption>gymdropupdate</image:caption><image:title>gymdropupdate</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/qr_scanner.webp</image:loc><image:caption>qrscanner</image:caption><image:title>qrscanner</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/GP1.webp</image:loc><image:caption>GP1</image:caption><image:title>GP1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/alien_installation.webp</image:loc><image:caption>alieninstallation</image:caption><image:title>alieninstallation</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/versions.webp</image:loc><image:caption>versions</image:caption><image:title>versions</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/GP_fud.webp</image:loc><image:caption>GPfud</image:caption><image:title>GPfud</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/GP2.webp</image:loc><image:caption>GP2</image:caption><image:title>GP2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/c2_communication.webp</image:loc><image:caption>c2communication</image:caption><image:title>c2communication</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/GP_tactics.webp</image:loc><image:caption>GPtactics</image:caption><image:title>GPtactics</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/update_process.webp</image:loc><image:caption>updateprocess</image:caption><image:title>updateprocess</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/filtering.webp</image:loc><image:caption>filtering</image:caption><image:title>filtering</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/GP_fam_stats.webp</image:loc><image:caption>GPfamstats</image:caption><image:title>GPfamstats</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/deceive-the-heavens/timeline.webp</image:loc><image:caption>timeline</image:caption><image:title>timeline</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/perseus-dto-malware-that-takes-notes</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MTI_Perseus.jpg</image:loc><image:caption>MTIPerseus</image:caption><image:title>MTIPerseus</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Perseus_report_4.png</image:loc><image:caption>Perseusreport4</image:caption><image:title>Perseusreport4</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Perseus_report_2.png</image:loc><image:caption>Perseusreport2</image:caption><image:title>Perseusreport2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Perseus_report_3.png</image:loc><image:caption>Perseusreport3</image:caption><image:title>Perseusreport3</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Perseus_report_1-1.png</image:loc><image:caption>Perseusreport11</image:caption><image:title>Perseusreport11</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202026-03-18%20at%2011-33-45-png.png</image:loc><image:caption>Screenshot20260318at113345png</image:caption><image:title>Screenshot20260318at113345png</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202026-03-18%20at%2011.31.14.png</image:loc><image:caption>Screenshot20260318at113114</image:caption><image:title>Screenshot20260318at113114</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image-png-Mar-18-2026-10-27-19-7485-AM.png</image:loc><image:caption>imagepngMar1820261027197485AM</image:caption><image:title>imagepngMar1820261027197485AM</image:title></image:image><lastmod>2026-03-19</lastmod></url><url><loc>https://www.threatfabric.com/blogs/the-trojan-horse-that-wanted-to-fly-rocinante</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/1.png</image:loc><image:caption>1</image:caption><image:title>1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ermac.png</image:loc><image:caption>ermac</image:caption><image:title>ermac</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_2024_Q2_Threat_Briefing_Akbank.png</image:loc><image:caption>TF2024Q2ThreatBriefingAkbank</image:caption><image:title>TF2024Q2ThreatBriefingAkbank</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/harry_tf_miyazaki_style_image_of_Rocinante_trojan_horse_with_wi_e5df5bee-17f2-4b62-a14c-776da7c6a06f.jpg</image:loc><image:caption>harrytfmiyazakistyleimageofRocinantetrojanhorsewithwie5df5bee17f24b62a14c776da7c6a06f</image:caption><image:title>harrytfmiyazakistyleimageofRocinantetrojanhorsewithwie5df5bee17f24b62a14c776da7c6a06f</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/targets-1.png</image:loc><image:caption>targets1</image:caption><image:title>targets1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/aaaaaaa.png</image:loc><image:caption>aaaaaaa</image:caption><image:title>aaaaaaa</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/capabilities.png</image:loc><image:caption>capabilities</image:caption><image:title>capabilities</image:title></image:image><lastmod>2024-08-28</lastmod></url><url><loc>https://www.threatfabric.com/jobs/senior-javascript-researcher-engineer</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2023-05-18</lastmod></url><url><loc>https://www.threatfabric.com/blogs/anatsa-trojan-returns-targeting-europe-and-expanding-its-reach</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide4.jpeg</image:loc><image:caption>Slide4</image:caption><image:title>Slide4</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_Anatsa_Blog2.png</image:loc><image:caption>TFAnatsaBlog2</image:caption><image:title>TFAnatsaBlog2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide3-1.jpeg</image:loc><image:caption>Slide31</image:caption><image:title>Slide31</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide2-1.jpeg</image:loc><image:caption>Slide21</image:caption><image:title>Slide21</image:title></image:image><lastmod>2024-02-19</lastmod></url><url><loc>https://www.threatfabric.com/blogs/getting-ready-for-psr-in-the-uk-why-fraud-fusion-experts-should-care</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/PSR_Social1.jpg</image:loc><image:caption>PSRSocial1</image:caption><image:title>PSRSocial1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2024-09-24</lastmod></url><url><loc>https://www.threatfabric.com/blogs/partners-in-crime-medusa-cabassous</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/partners-in-crime/recent_campaigns.webp</image:loc><image:caption>recentcampaigns</image:caption><image:title>recentcampaigns</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/partners-in-crime/semi.ats.webp</image:loc><image:caption>semiats</image:caption><image:title>semiats</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/partners-in-crime/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/partners-in-crime/capabilities.webp</image:loc><image:caption>capabilities</image:caption><image:title>capabilities</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/partners-in-crime/direct_reply.webp</image:loc><image:caption>directreply</image:caption><image:title>directreply</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/partners-in-crime/side_by_side_mti.webp</image:loc><image:caption>sidebysidemti</image:caption><image:title>sidebysidemti</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/partners-in-crime/control_input_field.webp</image:loc><image:caption>controlinputfield</image:caption><image:title>controlinputfield</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/partners-in-crime/configs_flu.webp</image:loc><image:caption>configsflu</image:caption><image:title>configsflu</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/resources/basic-voice-phishing</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-5-the-art-of-fusion-with-jake-norwood</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_JakeNorwood.jpg</image:loc><image:caption>TFFusionFiresideJakeNorwood</image:caption><image:title>TFFusionFiresideJakeNorwood</image:title></image:image><lastmod>2024-11-07</lastmod></url><url><loc>https://www.threatfabric.com/blogs/threatfabric-partnership-announcement-trapets</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF%20x%20Trapets%20Design%20Logo.png</image:loc><image:caption>TFxTrapetsDesignLogo</image:caption><image:title>TFxTrapetsDesignLogo</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/the-top-5-technology-requirements-for-fraud-prevention-in-financial-services</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_TechRequirements.jpg</image:loc><image:caption>TFTechRequirements</image:caption><image:title>TFTechRequirements</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2025-11-06</lastmod></url><url><loc>https://www.threatfabric.com/blogs/behavioural-modelling-and-the-future-of-fraud-prevention-with-patrick-bours</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_PatrickBours.jpg</image:loc><image:caption>TFFusionFiresidePatrickBours</image:caption><image:title>TFFusionFiresidePatrickBours</image:title></image:image><lastmod>2025-09-25</lastmod></url><url><loc>https://www.threatfabric.com/blogs/droppers-bypassing-android-13-restrictions</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide7-1.png</image:loc><image:caption>Slide71</image:caption><image:title>Slide71</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide4-Oct-25-2023-01-17-13-1314-PM.png</image:loc><image:caption>Slide4Oct2520230117131314PM</image:caption><image:title>Slide4Oct2520230117131314PM</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/SecuriDropper2.png</image:loc><image:caption>SecuriDropper2</image:caption><image:title>SecuriDropper2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/SecuriDropper-1.png</image:loc><image:caption>SecuriDropper1</image:caption><image:title>SecuriDropper1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_SecuriDropper_Social.jpg</image:loc><image:caption>TFSecuriDropperSocial</image:caption><image:title>TFSecuriDropperSocial</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide6-4.png</image:loc><image:caption>Slide64</image:caption><image:title>Slide64</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide5-4.png</image:loc><image:caption>Slide54</image:caption><image:title>Slide54</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Slide1-3.png</image:loc><image:caption>Slide13</image:caption><image:title>Slide13</image:title></image:image><lastmod>2023-11-07</lastmod></url><url><loc>https://www.threatfabric.com/blogs/fusion-fireside-14-a-marine-in-cyber-with-john-fokker</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_FusionFireside_JohnFokker.jpg</image:loc><image:caption>TFFusionFiresideJohnFokker</image:caption><image:title>TFFusionFiresideJohnFokker</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2025-12-03</lastmod></url><url><loc>https://www.threatfabric.com/blogs/new-campaigns-spread-banking-malware-through-google-play</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_unknown_sources_enabled_user_has_to_acknowledge_the_install.webp</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplayunknownsourcesenableduserhastoacknowledgetheinstall</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplayunknownsourcesenableduserhastoacknowledgetheinstall</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_bankbot_dropper_detected_by_client_side_detection.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplaybankbotdropperdetectedbyclientsidedetection</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplaybankbotdropperdetectedbyclientsidedetection</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_no_detections_by_play_protect.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplaynodetectionsbyplayprotect</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplaynodetectionsbyplayprotect</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_get_device_admin_and_download_malware_after_2_hours_code_snippet.webp</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplaygetdeviceadminanddownloadmalwareafter2hourscodesnippet</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplaygetdeviceadminanddownloadmalwareafter2hourscodesnippet</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_classic_solitaire.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplayclassicsolitaire</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplayclassicsolitaire</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_installed_apps_list.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplayinstalledappslist</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplayinstalledappslist</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_tornado_flashlight.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplaytornadoflashlight</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplaytornadoflashlight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_unknown_sources_disabled_install_is_blocked.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplayunknownsourcesdisabledinstallisblocked</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplayunknownsourcesdisabledinstallisblocked</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_lamp_for_darkness.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplaylampfordarkness</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplaylampfordarkness</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_collaboration.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplaycollaboration</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplaycollaboration</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_malware_installation_routine_code_snippet.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplaymalwareinstallationroutinecodesnippet</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplaymalwareinstallationroutinecodesnippet</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_spider_solitare.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplayspidersolitare</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplayspidersolitare</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_only_start_dropper_functionality_when_target_is_available_code_snippet.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplayonlystartdropperfunctionalitywhentargetisavailablecodesnippet</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplayonlystartdropperfunctionalitywhentargetisavailablecodesnippet</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_bankbot_dropper_on_google_play.webp</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplaybankbotdropperongoogleplay</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplaybankbotdropperongoogleplay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_xdc_cleaner.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplayxdccleaner</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplayxdccleaner</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/new-campaigns/new_campaigns_spread_banking_malware_through_google_play_solitaire.png</image:loc><image:caption>newcampaignsspreadbankingmalwarethroughgoogleplaysolitaire</image:caption><image:title>newcampaignsspreadbankingmalwarethroughgoogleplaysolitaire</image:title></image:image><lastmod>2023-03-03</lastmod></url><url><loc>https://www.threatfabric.com/resources/andromeda-the-latest-brazilian-dto-malware</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ontwerper_miyazaki_style_drawing_of_robot_creature_with_brazili_f71561c8-d394-4c4a-acbd-d5e586a99571.png</image:loc><image:caption>ontwerpermiyazakistyledrawingofrobotcreaturewithbrazilif71561c8d3944c4aacbdd5e586a99571</image:caption><image:title>ontwerpermiyazakistyledrawingofrobotcreaturewithbrazilif71561c8d3944c4aacbdd5e586a99571</image:title></image:image><lastmod>2023-09-12</lastmod></url><url><loc>https://www.threatfabric.com/blogs/h1-2022-mobile-threat-landscape</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/tf_q2_2022_mobilethreatlandscape_sheetsize.001.jpeg</image:loc><image:caption>tfq22022mobilethreatlandscapesheetsize001</image:caption><image:title>tfq22022mobilethreatlandscapesheetsize001</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2022-mobile-threat/droppers.webp</image:loc><image:caption>droppers</image:caption><image:title>droppers</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/voice.png</image:loc><image:caption>voice</image:caption><image:title>voice</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2022-mobile-threat/families.webp</image:loc><image:caption>families</image:caption><image:title>families</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2022-mobile-threat/fraud.webp</image:loc><image:caption>fraud</image:caption><image:title>fraud</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2022-mobile-threat/dropper.webp</image:loc><image:caption>dropper</image:caption><image:title>dropper</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2022-mobile-threat/poc.webp</image:loc><image:caption>poc</image:caption><image:title>poc</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2022-mobile-threat/ca.webp</image:loc><image:caption>ca</image:caption><image:title>ca</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2022-mobile-threat/odffamilies.webp</image:loc><image:caption>odffamilies</image:caption><image:title>odffamilies</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2022-mobile-threat/ermac.webp</image:loc><image:caption>ermac</image:caption><image:title>ermac</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2022-mobile-threat/stats.webp</image:loc><image:caption>stats</image:caption><image:title>stats</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2022-mobile-threat/installation.webp</image:loc><image:caption>installation</image:caption><image:title>installation</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/2022-mobile-threat/countries.webp</image:loc><image:caption>countries</image:caption><image:title>countries</image:title></image:image><lastmod>2023-06-27</lastmod></url><url><loc>https://www.threatfabric.com/blogs/spynote-rat-targeting-financial-institutions</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/spyNote-discovered-campaign.png</image:loc><image:caption>spyNotediscoveredcampaign</image:caption><image:title>spyNotediscoveredcampaign</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/spyNote-Bank-Impersonation.png</image:loc><image:caption>spyNoteBankImpersonation</image:caption><image:title>spyNoteBankImpersonation</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/spynote-capabilities.png</image:loc><image:caption>spynotecapabilities</image:caption><image:title>spynotecapabilities</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/TF-SpyNote-Statistical.png</image:loc><image:caption>TFSpyNoteStatistical</image:caption><image:title>TFSpyNoteStatistical</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cypherRat-Released-free.png</image:loc><image:caption>cypherRatReleasedfree</image:caption><image:title>cypherRatReleasedfree</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/TF_SpyNote_Sales.png</image:loc><image:caption>TFSpyNoteSales</image:caption><image:title>TFSpyNoteSales</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/spyware.png</image:loc><image:caption>spyware</image:caption><image:title>spyware</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/TF-SpyNote-accessibility.png</image:loc><image:caption>TFSpyNoteaccessibility</image:caption><image:title>TFSpyNoteaccessibility</image:title></image:image><lastmod>2023-06-27</lastmod></url><url><loc>https://www.threatfabric.com/blogs/the-rage-of-android-banking-trojans</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/conclusion.webp</image:loc><image:caption>conclusion</image:caption><image:title>conclusion</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/catalysts.webp</image:loc><image:caption>catalysts</image:caption><image:title>catalysts</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/evasion.webp</image:loc><image:caption>evasion</image:caption><image:title>evasion</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/ats.webp</image:loc><image:caption>ats</image:caption><image:title>ats</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/cover.webp</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/top_targets.webp</image:loc><image:caption>toptargets</image:caption><image:title>toptargets</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/labels.webp</image:loc><image:caption>labels</image:caption><image:title>labels</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/distribution.webp</image:loc><image:caption>distribution</image:caption><image:title>distribution</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/MO.webp</image:loc><image:caption>MO</image:caption><image:title>MO</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/gustuff.webp</image:loc><image:caption>gustuff</image:caption><image:title>gustuff</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/overlay.webp</image:loc><image:caption>overlay</image:caption><image:title>overlay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/recap.webp</image:loc><image:caption>recap</image:caption><image:title>recap</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/the-rage/github.webp</image:loc><image:caption>github</image:caption><image:title>github</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-06-27</lastmod></url><url><loc>https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/binding.png</image:loc><image:caption>binding</image:caption><image:title>binding</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/laplas.png</image:loc><image:caption>laplas</image:caption><image:title>laplas</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/aurora.png</image:loc><image:caption>aurora</image:caption><image:title>aurora</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/erbium.png</image:loc><image:caption>erbium</image:caption><image:title>erbium</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/xenomorph.png</image:loc><image:caption>xenomorph</image:caption><image:title>xenomorph</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/xenomorph_vidmate.png</image:loc><image:caption>xenomorphvidmate</image:caption><image:title>xenomorphvidmate</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cover.jpg</image:loc><image:caption>cover</image:caption><image:title>cover</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/website.png</image:loc><image:caption>website</image:caption><image:title>website</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/zombinder.png</image:loc><image:caption>zombinder</image:caption><image:title>zombinder</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/dropper.png</image:loc><image:caption>dropper</image:caption><image:title>dropper</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/exobot-android-malware-spreading-via-google-play-store</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot/exobot_android_malware_spreading_via_google_play_store_new_apps_dropping_exobot_malware_via_google_play_infected_android_versions.png</image:loc><image:caption>exobotandroidmalwarespreadingviagoogleplaystorenewappsdroppingexobotmalwareviagoogleplayinfectedandroidversions</image:caption><image:title>exobotandroidmalwarespreadingviagoogleplaystorenewappsdroppingexobotmalwareviagoogleplayinfectedandroidversions</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot/exobot_android_malware_spreading_via_google_play_store_new_apps_dropping_exobot_malware_via_google_play.webp</image:loc><image:caption>exobotandroidmalwarespreadingviagoogleplaystorenewappsdroppingexobotmalwareviagoogleplay</image:caption><image:title>exobotandroidmalwarespreadingviagoogleplaystorenewappsdroppingexobotmalwareviagoogleplay</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot/exobot_android_malware_spreading_via_google_play_store_new_apps_dropping_exobot_malware_via_google_play_number_of_infected_devices_per_country.png</image:loc><image:caption>exobotandroidmalwarespreadingviagoogleplaystorenewappsdroppingexobotmalwareviagoogleplaynumberofinfecteddevicespercountry</image:caption><image:title>exobotandroidmalwarespreadingviagoogleplaystorenewappsdroppingexobotmalwareviagoogleplaynumberofinfecteddevicespercountry</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/exobot/exobot_android_malware_spreading_via_google_play_store_new_apps_dropping_exobot_malware_via_google_play_the_usveryfood_botnet.webp</image:loc><image:caption>exobotandroidmalwarespreadingviagoogleplaystorenewappsdroppingexobotmalwareviagoogleplaytheusveryfoodbotnet</image:caption><image:title>exobotandroidmalwarespreadingviagoogleplaystorenewappsdroppingexobotmalwareviagoogleplaytheusveryfoodbotnet</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-03-03</lastmod></url><url><loc>https://www.threatfabric.com/blogs/vishing-rat-fraud-vs-fraud-kill-chain</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-03-04%20at%2008.52.04.png</image:loc><image:caption>Screenshot20240304at085204</image:caption><image:title>Screenshot20240304at085204</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-03-04%20at%2008.51.20.png</image:loc><image:caption>Screenshot20240304at085120</image:caption><image:title>Screenshot20240304at085120</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_CyberfraudKillchain_VishingRATFraud_FeaturedImage.png</image:loc><image:caption>TFCyberfraudKillchainVishingRATFraudFeaturedImage</image:caption><image:title>TFCyberfraudKillchainVishingRATFraudFeaturedImage</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_CyberfraudKillchain_VishingRATFraud_Details.png</image:loc><image:caption>TFCyberfraudKillchainVishingRATFraudDetails</image:caption><image:title>TFCyberfraudKillchainVishingRATFraudDetails</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-03-26%20at%2009.44.50.png</image:loc><image:caption>Screenshot20240326at094450</image:caption><image:title>Screenshot20240326at094450</image:title></image:image><lastmod>2024-03-26</lastmod></url><url><loc>https://www.threatfabric.com/blogs/achieving-new-heights-iso-27701-and-iso-22301-certifications</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/image%20(2).png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2024-07-23</lastmod></url><url><loc>https://www.threatfabric.com/blogs/lightspy-mapt-mobile-payment-system-attack</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-07%20at%2015.33.37.png</image:loc><image:caption>Screenshot20230907at153337</image:caption><image:title>Screenshot20230907at153337</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-08-17%20at%2017.57.23%20copy%202.png</image:loc><image:caption>Screenshot20230817at175723copy2</image:caption><image:title>Screenshot20230817at175723copy2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_LightSpy-1.jpg</image:loc><image:caption>TFLightSpy1</image:caption><image:title>TFLightSpy1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-05%20at%2014.42.30.png</image:loc><image:caption>Screenshot20230905at144230</image:caption><image:title>Screenshot20230905at144230</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-08-25%20at%2016.37.39.png</image:loc><image:caption>Screenshot20230825at163739</image:caption><image:title>Screenshot20230825at163739</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-07%20at%2016.06.19.png</image:loc><image:caption>Screenshot20230907at160619</image:caption><image:title>Screenshot20230907at160619</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-05%20at%2014.41.25.png</image:loc><image:caption>Screenshot20230905at144125</image:caption><image:title>Screenshot20230905at144125</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-05%20at%2016.06.40.png</image:loc><image:caption>Screenshot20230905at160640</image:caption><image:title>Screenshot20230905at160640</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-08-10%20at%2012.30.15%20copy.png</image:loc><image:caption>Screenshot20230810at123015copy</image:caption><image:title>Screenshot20230810at123015copy</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ios_expoit_chain_lightspy_07.png</image:loc><image:caption>iosexpoitchainlightspy07</image:caption><image:title>iosexpoitchainlightspy07</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-05%20at%2011.16.02.png</image:loc><image:caption>Screenshot20230905at111602</image:caption><image:title>Screenshot20230905at111602</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-04%20at%2013.09.06.png</image:loc><image:caption>Screenshot20230904at130906</image:caption><image:title>Screenshot20230904at130906</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-07%20at%2015.32.22.png</image:loc><image:caption>Screenshot20230907at153222</image:caption><image:title>Screenshot20230907at153222</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-07%20at%2016.13.28.png</image:loc><image:caption>Screenshot20230907at161328</image:caption><image:title>Screenshot20230907at161328</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-07%20at%2011.06.39.png</image:loc><image:caption>Screenshot20230907at110639</image:caption><image:title>Screenshot20230907at110639</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-15%20at%2011.42.54.png</image:loc><image:caption>Screenshot20230915at114254</image:caption><image:title>Screenshot20230915at114254</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-07%20at%2015.58.48.png</image:loc><image:caption>Screenshot20230907at155848</image:caption><image:title>Screenshot20230907at155848</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-08-28%20at%2016.02.24.png</image:loc><image:caption>Screenshot20230828at160224</image:caption><image:title>Screenshot20230828at160224</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-15%20at%2012.52.02.png</image:loc><image:caption>Screenshot20230915at125202</image:caption><image:title>Screenshot20230915at125202</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-07%20at%2011.57.29.png</image:loc><image:caption>Screenshot20230907at115729</image:caption><image:title>Screenshot20230907at115729</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-07%20at%2011.54.14%20copy.png</image:loc><image:caption>Screenshot20230907at115414copy</image:caption><image:title>Screenshot20230907at115414copy</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-15%20at%2016.32.34.png</image:loc><image:caption>Screenshot20230915at163234</image:caption><image:title>Screenshot20230915at163234</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-08-25%20at%2017.40.23.png</image:loc><image:caption>Screenshot20230825at174023</image:caption><image:title>Screenshot20230825at174023</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-05%20at%2016.43.27.png</image:loc><image:caption>Screenshot20230905at164327</image:caption><image:title>Screenshot20230905at164327</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-07%20at%2015.35.18.png</image:loc><image:caption>Screenshot20230907at153518</image:caption><image:title>Screenshot20230907at153518</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-07%20at%2016.16.47.png</image:loc><image:caption>Screenshot20230907at161647</image:caption><image:title>Screenshot20230907at161647</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-08-18%20at%2010.45.41%20copy.png</image:loc><image:caption>Screenshot20230818at104541copy</image:caption><image:title>Screenshot20230818at104541copy</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-03%20at%2011.32.25.png</image:loc><image:caption>Screenshot20230903at113225</image:caption><image:title>Screenshot20230903at113225</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_LightSpy_Toolset.png</image:loc><image:caption>TFLightSpyToolset</image:caption><image:title>TFLightSpyToolset</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-04%20at%2017.08.27.png</image:loc><image:caption>Screenshot20230904at170827</image:caption><image:title>Screenshot20230904at170827</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-05%20at%2014.35.16.png</image:loc><image:caption>Screenshot20230905at143516</image:caption><image:title>Screenshot20230905at143516</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-07%20at%2012.02.06.png</image:loc><image:caption>Screenshot20230907at120206</image:caption><image:title>Screenshot20230907at120206</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-05%20at%2011.24.03.png</image:loc><image:caption>Screenshot20230905at112403</image:caption><image:title>Screenshot20230905at112403</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-05%20at%2014.51.07.png</image:loc><image:caption>Screenshot20230905at145107</image:caption><image:title>Screenshot20230905at145107</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-08-09%20at%2014.11.33%20copy.png</image:loc><image:caption>Screenshot20230809at141133copy</image:caption><image:title>Screenshot20230809at141133copy</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202023-09-15%20at%2014.43.31.png</image:loc><image:caption>Screenshot20230915at144331</image:caption><image:title>Screenshot20230915at144331</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-10-02</lastmod></url><url><loc>https://www.threatfabric.com/blogs/the-attack-of-the-droppers</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/capabilities%20(1).png</image:loc><image:caption>capabilities1</image:caption><image:title>capabilities1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/evolution-1.png</image:loc><image:caption>evolution1</image:caption><image:title>evolution1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/distribution.png</image:loc><image:caption>distribution</image:caption><image:title>distribution</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/permissions.png</image:loc><image:caption>permissions</image:caption><image:title>permissions</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/requests.png</image:loc><image:caption>requests</image:caption><image:title>requests</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/cover%20(1).png</image:loc><image:caption>cover1</image:caption><image:title>cover1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/strings.png</image:loc><image:caption>strings</image:caption><image:title>strings</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/installation.jpg</image:loc><image:caption>installation</image:caption><image:title>installation</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/sharkbot_dropper_2.png</image:loc><image:caption>sharkbotdropper2</image:caption><image:title>sharkbotdropper2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/fake_update.png</image:loc><image:caption>fakeupdate</image:caption><image:title>fakeupdate</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/sharkbot_dropper.png</image:loc><image:caption>sharkbotdropper</image:caption><image:title>sharkbotdropper</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/droppers.png</image:loc><image:caption>droppers</image:caption><image:title>droppers</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/a11y.png</image:loc><image:caption>a11y</image:caption><image:title>a11y</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.threatfabric.com/blogs/lightspy-implant-for-ios</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_LightSpyiOS.jpg</image:loc><image:caption>TFLightSpyiOS</image:caption><image:title>TFLightSpyiOS</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-07-10%20at%2016.53.55.png</image:loc><image:caption>Screenshot20240710at165355</image:caption><image:title>Screenshot20240710at165355</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-22%20at%2014.36.08.png</image:loc><image:caption>Screenshot20240722at143608</image:caption><image:title>Screenshot20240722at143608</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-25%20at%2010.48.12.png</image:loc><image:caption>Screenshot20240725at104812</image:caption><image:title>Screenshot20240725at104812</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-30%20at%2011.37.13.png</image:loc><image:caption>Screenshot20240730at113713</image:caption><image:title>Screenshot20240730at113713</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-17%20at%2013.33.40.png</image:loc><image:caption>Screenshot20240717at133340</image:caption><image:title>Screenshot20240717at133340</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/LightSpy-iOS-Layout.bmp</image:loc><image:caption>LightSpyiOSLayout</image:caption><image:title>LightSpyiOSLayout</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-23%20at%2012.28.38.png</image:loc><image:caption>Screenshot20240723at122838</image:caption><image:title>Screenshot20240723at122838</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-17%20at%2018.00.56.png</image:loc><image:caption>Screenshot20240717at180056</image:caption><image:title>Screenshot20240717at180056</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-26%20at%2015.13.50.png</image:loc><image:caption>Screenshot20240726at151350</image:caption><image:title>Screenshot20240726at151350</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-23%20at%2016.19.49.png</image:loc><image:caption>Screenshot20240723at161949</image:caption><image:title>Screenshot20240723at161949</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-24%20at%2018.04.08.png</image:loc><image:caption>Screenshot20240724at180408</image:caption><image:title>Screenshot20240724at180408</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-23%20at%2016.10.59.png</image:loc><image:caption>Screenshot20240723at161059</image:caption><image:title>Screenshot20240723at161059</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-26%20at%2015.13.28.png</image:loc><image:caption>Screenshot20240726at151328</image:caption><image:title>Screenshot20240726at151328</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Screenshot%202024-07-29%20at%2014.06.32.png</image:loc><image:caption>Screenshot20240729at140632</image:caption><image:title>Screenshot20240729at140632</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-23%20at%2016.29.58.png</image:loc><image:caption>Screenshot20240723at162958</image:caption><image:title>Screenshot20240723at162958</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-18%20at%2010.13.19.png</image:loc><image:caption>Screenshot20240718at101319</image:caption><image:title>Screenshot20240718at101319</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-22%20at%2013.49.11.png</image:loc><image:caption>Screenshot20240722at134911</image:caption><image:title>Screenshot20240722at134911</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-22%20at%2014.14.35.png</image:loc><image:caption>Screenshot20240722at141435</image:caption><image:title>Screenshot20240722at141435</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-22%20at%2013.30.20.png</image:loc><image:caption>Screenshot20240722at133020</image:caption><image:title>Screenshot20240722at133020</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-22%20at%2015.29.35.png</image:loc><image:caption>Screenshot20240722at152935</image:caption><image:title>Screenshot20240722at152935</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-23%20at%2016.15.03.png</image:loc><image:caption>Screenshot20240723at161503</image:caption><image:title>Screenshot20240723at161503</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpyiOS/Screenshot%202024-07-26%20at%2015.14.11.png</image:loc><image:caption>Screenshot20240726at151411</image:caption><image:title>Screenshot20240726at151411</image:title></image:image><lastmod>2024-10-29</lastmod></url><url><loc>https://www.threatfabric.com/blogs/shift-left-on-fraud-turning-fraud-management-into-fraud-prevention</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ShiftLeftOnFraud.png</image:loc><image:caption>ShiftLeftOnFraud</image:caption><image:title>ShiftLeftOnFraud</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ShiftLeftOnFraud_FeaturedImage2.jpg</image:loc><image:caption>ShiftLeftOnFraudFeaturedImage2</image:caption><image:title>ShiftLeftOnFraudFeaturedImage2</image:title></image:image><lastmod>2026-02-12</lastmod></url><url><loc>https://www.threatfabric.com/blogs/building-a-bullet-proof-external-financial-fraud-intelligence-program</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/harry_tf_researcher_sitting_behind_desk_in_front_of_giant_glass_b54cab5e-4166-4c7e-9757-1aa42d2fe360.jpg</image:loc><image:caption>harrytfresearchersittingbehinddeskinfrontofgiantglassb54cab5e41664c7e97571aa42d2fe360</image:caption><image:title>harrytfresearchersittingbehinddeskinfrontofgiantglassb54cab5e41664c7e97571aa42d2fe360</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Brent%20Whittington.png</image:loc><image:caption>BrentWhittington</image:caption><image:title>BrentWhittington</image:title></image:image><lastmod>2024-08-22</lastmod></url><url><loc>https://www.threatfabric.com/blogs/lightspy-implant-for-macos</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-05-01%20at%2012.06.51.png</image:loc><image:caption>Screenshot20240501at120651</image:caption><image:title>Screenshot20240501at120651</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-16%20at%2016.54.53.png</image:loc><image:caption>Screenshot20240416at165453</image:caption><image:title>Screenshot20240416at165453</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/macimplant1.png</image:loc><image:caption>macimplant1</image:caption><image:title>macimplant1</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/victims.png</image:loc><image:caption>victims</image:caption><image:title>victims</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-05-01%20at%2017.47.58.png</image:loc><image:caption>Screenshot20240501at174758</image:caption><image:title>Screenshot20240501at174758</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-15%20at%2015.20.04.png</image:loc><image:caption>Screenshot20240415at152004</image:caption><image:title>Screenshot20240415at152004</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-22%20at%2012.01.45.png</image:loc><image:caption>Screenshot20240422at120145</image:caption><image:title>Screenshot20240422at120145</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-09%20at%2011.13.01.png</image:loc><image:caption>Screenshot20240409at111301</image:caption><image:title>Screenshot20240409at111301</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-15%20at%2017.52.34.png</image:loc><image:caption>Screenshot20240415at175234</image:caption><image:title>Screenshot20240415at175234</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-15%20at%2014.45.55.png</image:loc><image:caption>Screenshot20240415at144555</image:caption><image:title>Screenshot20240415at144555</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/xordecode.png</image:loc><image:caption>xordecode</image:caption><image:title>xordecode</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-05-01%20at%2012.17.21.png</image:loc><image:caption>Screenshot20240501at121721</image:caption><image:title>Screenshot20240501at121721</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-15%20at%2012.57.12.png</image:loc><image:caption>Screenshot20240415at125712</image:caption><image:title>Screenshot20240415at125712</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-15%20at%2014.48.10.png</image:loc><image:caption>Screenshot20240415at144810</image:caption><image:title>Screenshot20240415at144810</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-09%20at%2011.32.00.png</image:loc><image:caption>Screenshot20240409at113200</image:caption><image:title>Screenshot20240409at113200</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-17%20at%2014.46.59.png</image:loc><image:caption>Screenshot20240417at144659</image:caption><image:title>Screenshot20240417at144659</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-17%20at%2014.07.16.png</image:loc><image:caption>Screenshot20240417at140716</image:caption><image:title>Screenshot20240417at140716</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/harry_tf_miyazaki_style_image_of_jellyfish_playing_tug-of-war_w_00f220c1-9dd8-44e8-9367-e3e18b0485bc.jpg</image:loc><image:caption>harrytfmiyazakistyleimageofjellyfishplayingtugofwarw00f220c19dd844e89367e3e18b0485bc</image:caption><image:title>harrytfmiyazakistyleimageofjellyfishplayingtugofwarw00f220c19dd844e89367e3e18b0485bc</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-22%20at%2011.57.23.png</image:loc><image:caption>Screenshot20240422at115723</image:caption><image:title>Screenshot20240422at115723</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/bashscript.png</image:loc><image:caption>bashscript</image:caption><image:title>bashscript</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-22%20at%2011.49.41.png</image:loc><image:caption>Screenshot20240422at114941</image:caption><image:title>Screenshot20240422at114941</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-15%20at%2014.12.56.png</image:loc><image:caption>Screenshot20240415at141256</image:caption><image:title>Screenshot20240415at141256</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-15%20at%2017.45.42.png</image:loc><image:caption>Screenshot20240415at174542</image:caption><image:title>Screenshot20240415at174542</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-15%20at%2015.12.50.png</image:loc><image:caption>Screenshot20240415at151250</image:caption><image:title>Screenshot20240415at151250</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-17%20at%2016.08.19.png</image:loc><image:caption>Screenshot20240417at160819</image:caption><image:title>Screenshot20240417at160819</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/2.bmp</image:loc><image:caption>2</image:caption><image:title>2</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-15%20at%2015.22.19.png</image:loc><image:caption>Screenshot20240415at152219</image:caption><image:title>Screenshot20240415at152219</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/weblogs.png</image:loc><image:caption>weblogs</image:caption><image:title>weblogs</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-15%20at%2010.37.10.png</image:loc><image:caption>Screenshot20240415at103710</image:caption><image:title>Screenshot20240415at103710</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-22%20at%2010.34.32.png</image:loc><image:caption>Screenshot20240422at103432</image:caption><image:title>Screenshot20240422at103432</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/LightSpymacOS/Screenshot%202024-04-22%20at%2014.05.26.png</image:loc><image:caption>Screenshot20240422at140526</image:caption><image:title>Screenshot20240422at140526</image:title></image:image><lastmod>2024-05-30</lastmod></url><url><loc>https://www.threatfabric.com/partners</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/TF_WebsiteAssets_Partners.png</image:loc><image:caption>TFWebsiteAssetsPartners</image:caption><image:title>TFWebsiteAssetsPartners</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/images/fraud-ecosystem-minified.png</image:loc><image:caption>fraudecosystemminified</image:caption><image:title>fraudecosystemminified</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2025-01-13</lastmod></url><url><loc>https://www.threatfabric.com/resources/impersonation-scam-protection</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/MicrosoftTeams-image%20(45).png</image:loc><image:caption>MicrosoftTeamsimage45</image:caption><image:title>MicrosoftTeamsimage45</image:title></image:image><lastmod>2023-11-07</lastmod></url><url><loc>https://www.threatfabric.com/blogs/xenomorph-malware-strikes-again-over-30-us-banks-now-targeted</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/ThreatFabric_SocialCard.png</image:loc><image:caption>ThreatFabricSocialCard</image:caption><image:title>ThreatFabricSocialCard</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><lastmod>2023-09-27</lastmod></url><url><loc>https://www.threatfabric.com/blogs/bankbot_dropper_hiding_on_google_play</loc><video:video><video:thumbnail_loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/bankbot-dropper/bankbot_dropper_hiding_on_google_play_flow.mp4/medium.jpg</video:thumbnail_loc><video:title>Demonstration video of the threat</video:title><video:description>Demonstration video of the threat</video:description><video:content_loc>https://www.threatfabric.com/hubfs/Threatfabric/images/blog/bankbot-dropper/bankbot_dropper_hiding_on_google_play_flow.mp4</video:content_loc><video:duration>14</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.threatfabric.com/hubfs/bankbot_dropper_hiding_on_google_play_permission_request_to_draw_over_apps.webp</image:loc><image:caption>bankbotdropperhidingongoogleplaypermissionrequesttodrawoverapps</image:caption><image:title>bankbotdropperhidingongoogleplaypermissionrequesttodrawoverapps</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/bankbot_dropper_hiding_on_google_play_bubble_shooter_wild_life_additional_information.webp</image:loc><image:caption>bankbotdropperhidingongoogleplaybubbleshooterwildlifeadditionalinformation</image:caption><image:title>bankbotdropperhidingongoogleplaybubbleshooterwildlifeadditionalinformation</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/bankbot_dropper_hiding_on_google_play_earn_real_money_gift_cards.webp</image:loc><image:caption>bankbotdropperhidingongoogleplayearnrealmoneygiftcards</image:caption><image:title>bankbotdropperhidingongoogleplayearnrealmoneygiftcards</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/bankbot_dropper_hiding_on_google_play_dropper_installs_apk_from_sdcard.webp</image:loc><image:caption>bankbotdropperhidingongoogleplaydropperinstallsapkfromsdcard</image:caption><image:title>bankbotdropperhidingongoogleplaydropperinstallsapkfromsdcard</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/bankbot_dropper_hiding_on_google_play_accessibility_service_enabled.webp</image:loc><image:caption>bankbotdropperhidingongoogleplayaccessibilityserviceenabled</image:caption><image:title>bankbotdropperhidingongoogleplayaccessibilityserviceenabled</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/bankbot_dropper_hiding_on_google_play_earn_real_money_gift_cards_additional_information.webp</image:loc><image:caption>bankbotdropperhidingongoogleplayearnrealmoneygiftcardsadditionalinformation</image:caption><image:title>bankbotdropperhidingongoogleplayearnrealmoneygiftcardsadditionalinformation</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/bankbot_dropper_hiding_on_google_play_bubble_shooter_wild_life.webp</image:loc><image:caption>bankbotdropperhidingongoogleplaybubbleshooterwildlife</image:caption><image:title>bankbotdropperhidingongoogleplaybubbleshooterwildlife</image:title></image:image><lastmod>2025-06-18</lastmod></url><url><loc>https://www.threatfabric.com/resources/the-state-of-android-banking-malware-insights-from-2022-and-predictions-for-2023</loc><image:image><image:loc>https://www.threatfabric.com/hubfs/40185.png</image:loc><image:caption>40185</image:caption><image:title>40185</image:title></image:image><image:image><image:loc>https://www.threatfabric.com/hubfs/Threatfabric/logos/threatfabric-logo-light.svg</image:loc><image:caption>threatfabriclogolight</image:caption><image:title>threatfabriclogolight</image:title></image:image><lastmod>2023-08-24</lastmod></url></urlset>