Android Remote Access Trojan Equipped to Harvest Credentials


The SonicWall Capture Labs threat research team has been regularly sharing information about malware targeting Android devices.

The researchers encountered similar RAT samples before, but this one includes extra commands and phishing attacks designed to harvest credentials. This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices.

Read more…
Source: SonicWall


Sign up for our Newsletter


Related:

  • SoumniBot: the new Android banker’s unique techniques

    April 17, 2024

    The creators of widespread malware programs often employ various tools that hinder code detection and analysis, and Android malware is no exception. As an example of this, droppers, such as Badpack and Hqwar, designed for stealthily delivering Trojan bankers or spyware to smartphones, are very popular among malicious actors who attack mobile devices. That said, we ...

  • Google patches critical vulnerability for Androids with Qualcomm chips

    April 3, 2024

    In April’s update for the Android operating system (OS), Google has patched 28 vulnerabilities, one of which is rated critical for Android devices equipped with Qualcomm chips. You can find your device’s Android version number, security update level, and Google Play system level in your Settings app. You’ll get notifications when updates are available for you, ...

  • Android malware, Android malware and more Android malware

    March 20, 2024

    Among the mobile platforms, Android remains the most popular target operating system for cybercriminals. Last month, Kaspersky wrote a total of four private crimeware reports on Android malware, three of which are summarized below. Tambir Tambir is an Android backdoor that targets users in Turkey. It disguises itself as an IPTV app, but does not manifest any ...

  • Android/SpyNote Moves to Crypto Currencies

    February 15, 2024

    Like much Android malware today, this malware abuses the Accessibility API. This API is used to automatically perform UI actions. For example, the malicious sample uses the Accessibility API to record device unlocking gestures. Newer, this SpyNote sample uses the Accessibility API to target famous crypto wallets. Read more… Source: Fortinet  

  • Hackers uncover new TheTruthSpy stalkerware victims

    February 12, 2024

    A consumer-grade spyware operation called TheTruthSpy poses an ongoing security and privacy risk to thousands of people whose Android devices are unknowingly compromised with its mobile surveillance apps, not least due to a simple security flaw that its operators never fixed. Now, two hacking groups have independently found the flaw that allows the mass access of ...

  • Google saves your conversations with Gemini for years by default

    February 8, 2024

    Don’t type anything into Gemini, Google’s family of GenAI apps, that’s incriminating — or that you wouldn’t want someone else to see. That’s the PSA (of sorts) today from Google, which in a new support document outlines the ways in which it collects data from users of its Gemini chatbot apps for the web, Android and ...