Android Remote Access Trojan Equipped to Harvest Credentials


The SonicWall Capture Labs threat research team has been regularly sharing information about malware targeting Android devices.

The researchers encountered similar RAT samples before, but this one includes extra commands and phishing attacks designed to harvest credentials. This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices.

Read more…
Source: SonicWall


Sign up for our Newsletter


Related:

  • New Virus Called “Invisible Man” Going After Android Users

    August 3, 2017

    Security researchers warn that a new form of malware is targeting Android devices, posing as a Flash update that needs to be installed as soon as possible. SophosLabs, however, warns not only that this is fake update, but also that it includes a form of malware known as Invisible Man and officially flagged as Andr/Banker-GUA. The ...

  • After Windows and Android, Operation Emmental Starts Targeting Apple Users

    July 11, 2017

    Security experts have discovered new malware that is specifically aimed at Apple customers, after previously targeting users running Windows and Android on their devices. Believed to be part of Operation Emmental, which was first spotted in 2012, the new malware is called Dok and is primarily targeting customers of Swiss banks, according to an in-depth analysis ...

  • Ultrasonic Beacons Are Tracking Your Every Movement

    May 5, 2017

    More than 200 Android mobile applications listen surreptitiously for ultrasonic beacons embedded in audio that are used to track users and serve them with targeted advertising. Academics from Technische Universitat Braunschweig in Germany recently published a paper in which they describe their research into the practice of using these beacons to monitor a consumer’s shopping and ...

  • ​FalseGuide malware victim count jumps to 2 million

    April 26, 2017

    An estimated 2 million Android users have now fallen victim to malware mistakenly downloaded from Google Play, which was initially reported to have affected approximately 600,000 users. The malware, dubbed FalseGuide, was hidden in more than 40 guide apps for games, the oldest of which was uploaded to Google Play as early as November last year, ...