Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

New Android RAT Tricks with Fake Apps

April 30, 2024
Reading Time: 3 mins read
in Alerts
New Android RAT Tricks with Fake Apps

A newly identified RAT (Remote Access Trojan) malware is raising alarms across the Android ecosystem due to its advanced capabilities and deceptive techniques. Unlike typical RATs, this variant not only executes a broader range of commands but also specializes in phishing attacks by masquerading as widely-used social media applications like Snapchat, Instagram, WhatsApp, Twitter, and Google. This allows the malware to harvest user credentials by presenting fake login pages that appear legitimate to unsuspecting users.

Sonicwall’s investigation into the malware revealed that it contains multiple HTML files in its assets folder, designed to duplicate the login pages of several prominent apps. These counterfeit pages are instrumental in collecting user credentials and sending them back to a command-and-control (C2) server. This data theft is part of a broader set of malicious activities enabled after the malware gains critical permissions such as Accessibility service and Device admin upon installation.

The distribution method of this malware remains somewhat unclear; however, it is likely being spread via traditional social engineering techniques. Once installed on an Android device, the malware engages with the C2 server to receive further instructions for executing specific malicious tasks. This communication enables the malware to perform a variety of functions, including stealing credentials from other applications and browsers, and even modifying the device’s settings such as changing the wallpaper under certain conditions.

The malware’s capabilities extend beyond simple credential theft. It can access and exfiltrate the list of phone numbers stored on the device, manipulate the device’s wallpaper, and even control the flashlight using the CameraManager based on commands received from the C2 server. These functionalities highlight the malware’s ability to deeply integrate and interact with the host device, posing significant risks to users’ privacy and device security. Users are advised to stay vigilant, scrutinize app permissions carefully, and avoid downloading applications from unverified sources.

Reference:
  • New Android RAT Malware Targets Social Media Users

Tags: April 2024Cyber AlertCyber Alerts 2024Cyber RiskCyber threatGoogleInstagramRATRemote Access TrojanSnapchatTwitterWhatsapp
ADVERTISEMENT

Related Posts

COLDRIVER Hackers Target Sensitive Data

COLDRIVER Hackers Target Sensitive Data

May 8, 2025
COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

May 8, 2025
COLDRIVER Hackers Target Sensitive Data

CoGUI Targets Consumer and Finance Brands

May 8, 2025
Critical Kibana Flaws Allows Code Execution

Mirai Botnet Exploits Vulnerabilities in IoT

May 7, 2025
Critical Kibana Flaws Allows Code Execution

Critical Kibana Flaws Allows Code Execution

May 7, 2025
Critical Kibana Flaws Allows Code Execution

New OttoKit Flaw Targets WordPress Sites

May 7, 2025

Latest Alerts

CoGUI Targets Consumer and Finance Brands

COLDRIVER Hackers Target Sensitive Data

Cisco Fixes Flaw in IOS Wireless Controller

New OttoKit Flaw Targets WordPress Sites

Mirai Botnet Exploits Vulnerabilities in IoT

Critical Kibana Flaws Allows Code Execution

Subscribe to our newsletter

    Latest Incidents

    Masimo Cyberattack Disrupts Manufacturing

    Cyberattack Targets Tepotzotlán Facebook

    West Lothian Schools Hit by Ransomware

    UK Legal Aid Agency Faces Cyber Incident

    South African Airways Hit by Cyberattack

    Coweta County School System Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial