Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

New Android RAT Tricks with Fake Apps

April 30, 2024
Reading Time: 3 mins read
in Alerts
New Android RAT Tricks with Fake Apps

A newly identified RAT (Remote Access Trojan) malware is raising alarms across the Android ecosystem due to its advanced capabilities and deceptive techniques. Unlike typical RATs, this variant not only executes a broader range of commands but also specializes in phishing attacks by masquerading as widely-used social media applications like Snapchat, Instagram, WhatsApp, Twitter, and Google. This allows the malware to harvest user credentials by presenting fake login pages that appear legitimate to unsuspecting users.

Sonicwall’s investigation into the malware revealed that it contains multiple HTML files in its assets folder, designed to duplicate the login pages of several prominent apps. These counterfeit pages are instrumental in collecting user credentials and sending them back to a command-and-control (C2) server. This data theft is part of a broader set of malicious activities enabled after the malware gains critical permissions such as Accessibility service and Device admin upon installation.

The distribution method of this malware remains somewhat unclear; however, it is likely being spread via traditional social engineering techniques. Once installed on an Android device, the malware engages with the C2 server to receive further instructions for executing specific malicious tasks. This communication enables the malware to perform a variety of functions, including stealing credentials from other applications and browsers, and even modifying the device’s settings such as changing the wallpaper under certain conditions.

The malware’s capabilities extend beyond simple credential theft. It can access and exfiltrate the list of phone numbers stored on the device, manipulate the device’s wallpaper, and even control the flashlight using the CameraManager based on commands received from the C2 server. These functionalities highlight the malware’s ability to deeply integrate and interact with the host device, posing significant risks to users’ privacy and device security. Users are advised to stay vigilant, scrutinize app permissions carefully, and avoid downloading applications from unverified sources.

Reference:
  • New Android RAT Malware Targets Social Media Users

Tags: April 2024Cyber AlertCyber Alerts 2024Cyber RiskCyber threatGoogleInstagramRATRemote Access TrojanSnapchatTwitterWhatsapp
ADVERTISEMENT

Related Posts

GhostSpy Android Malware Full Device Control

FBI Warns Luna Moth Targets US Law Firms

May 27, 2025
GhostSpy Android Malware Full Device Control

Winos 4.0 Malware Spread Via Fake Installers

May 27, 2025
GhostSpy Android Malware Full Device Control

GhostSpy Android Malware Full Device Control

May 27, 2025
D-Link Routers Exposed by Weak Credentials

D-Link Routers Exposed by Weak Credentials

May 26, 2025
D-Link Routers Exposed by Weak Credentials

TA-ShadowCricke Unmasked via Backdoors

May 26, 2025
D-Link Routers Exposed by Weak Credentials

Killnet Resurfaces with New Identity

May 26, 2025

Latest Alerts

FBI Warns Luna Moth Targets US Law Firms

Winos 4.0 Malware Spread Via Fake Installers

GhostSpy Android Malware Full Device Control

D-Link Routers Exposed by Weak Credentials

TA-ShadowCricke Unmasked via Backdoors

Killnet Resurfaces with New Identity

Subscribe to our newsletter

    Latest Incidents

    Everest Ransomware Leaks Coke Staff Data

    Adidas Data Breach Exposes Customer Contacts

    Semiconductor Firm AXT Hit by Data Breach

    Hackers Steal $700K from Philly School District Accounts

    Chinese hackers hit US utilities via flaw

    Naukri Fixes Bug That Exposed Recruiter Email Addresses

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial