Home Security WolfRAT Malware Targets Messengers Apps On Android Devices

WolfRAT Malware Targets Messengers Apps On Android Devices

by ethhack

Heads up Android users! Here is another threat targeting your devices. New malware WolfRAT has surfaced online that targets messenger apps on Android, including Facebook Messenger and WhatsApp.

WolfRAT Malware Targeting Messenger Apps

Researchers from Cisco Talos Intelligence have found this Android malware in the wild, Dubbed WolfRAT, this malware specifically targets messaging apps on Android devices. These apps even include popular apps like Facebook Messenger, WhatsApp, and Line.

Sharing the details in a blog post, the researchers stated that this malware loosely bases on the leaked malware DenDroid. Yet, the malware seems to have gone through various improvements in stages to target the users. As stated by the researchers,

We watched WolfRAT evolve through various iterations which shows that the actor wanted to ensure functional improvements — perhaps they had deadlines to meet for their customers, but with no thought given to removing old code blocks, classes, etc. throughout the Android package.

Briefly, the malware targets messaging and chat apps on Android. To steal data, it begins taking stealthy screenshots of chats whenever such apps are open. This is in contrast with most new malware that exploit Android Accessibility Suite to access data. The screenshots are then uploaded to the C2 server of the malware.

The malware reaches the target device through various malicious and fake updates to otherwise legit apps. For instance, it can mimic the Google Service to trick the user into installing the malware.

Then, it seeks explicit permissions from the victim to run on the device.

The malware will start the main service if all the requested permissions and the device admin privileges are granted. Otherwise, it will launch an ACTION_APPLICATION_SETTINGS intent trying to trick the user to grant the permissions.

Overall, it has a very basic structure with primitive anti-analysis functionality that only scans for an emulator environment.

Detailed technical analysis of the malware is available in the researchers’ post.

Presently Active In Thailand

Researchers dubbed this new malware as WolfRAT considering the malware’s link with the now-defunct Wolf Research. Although the organization seemingly closed down, with this malware, the researchers believe that the threat actor is still active.

At present, the malware is actively targeting Android users in Thailand, supposedly, as an interception tool. Also, it presently bears a very basic structure. The threat actors have also leveraged open-source platforms for codes and packages.

Nonetheless, the continuous iterations in the malware and the stealthy data exfiltration capabilities hint that the malware may evolve into a serious threat in the future.

The following two tabs change content below.
Avatar
Abeerah has been a passionate blogger for several years with a particular interest towards science and technology. She is crazy to know everything about the latest tech developments. Knowing and writing about cybersecurity, hacking, and spying has always enchanted her. When she is not writing, what else can be a better pastime than web surfing and staying updated about the tech world! Reach out to me at: [email protected]
Avatar

Source link

Related Articles

Leave a Comment