Cybersecurity researchers at CheckPoint identified Rafel RAT, an open-source tool that enables remote administration for malicious activities on Android devices. Consequently, there’s a strong need to improve security measures within the Android ecosystem.
Android Rafel RAT
Check Point Research discovered that around 120 malicious campaigns targeting high-profile organizations globally were using Rafel, an open-source Android RAT used by multiple threat actors.
However, Rafel can be utilized, among other things, for remote access to a compromised system network or device.
Frequently targeted were those with outdated Android versions, such as Samsung, Google, and Xiaomi devices, which became victims.
Victim devices (Source – Check Point)
The malware appears just like one of the real apps, requests permissions, and communicates with C&C servers over HTTP(S). Using PHP panel, hackers monitor and control infected devices.
Not only that even they can get sensitive information and execute commands remotely.
Rafel RAT features (Source – Check Point)
This highlights significant risks in the Android ecosystem, with observed malicious activities including ransomware operations, 2FA bypasses, and government site hacks.
Rafel uses DeviceAdmin authorizations to lock screens, block uninstallations, and encrypt or delete files.
This might have been a recent Iranian campaign that targeted a Pakistani victim through Rafel malware, used to compromise devices and show extortion pop-ups.
Still, the same hacker infiltrated one of the Pakistani government sites and installed a C&C portal for Rafel.
It’s an open-source program with a large range of features, including options such as bypassing 2FA, which make it highly adaptable to threat actors focusing on different countries.
Consequently, Android security measures must be defensive in nature, such as threat intelligence, endpoint protection, user education, and collaboration among stakeholders within the information security ecosystem.
Comments
Post a Comment
Commenter vous !