BTC $58379.9472
ETH $2982.7872
BNB $563.0335
SOL $134.7235
XRP $0.5177
stETH $2971.9755
DOGE $0.1303
TON $4.8905
ADA $0.4503
AVAX $33.3328
TRX $0.1205
wstETH $3474.4227
DOT $6.8866
WETH $2975.5564
WBTC $58376.0680
BCH $424.7496
LINK $13.3612
MATIC $0.6924
UNI $7.0434
ICP $13.2308
LTC $80.1663
DAI $1.0012
FDUSD $1.0026
CAKE $2.5276
RNDR $7.6591
IMX $2.0284
ETC $25.5672
NEAR $6.1572
HBAR $0.0999
FIL $5.7239
STX $2.1417
MNT $0.9501
PEPE $0.0000
OKB $48.7666
ATOM $8.7518
WIF $2.6145
VET $0.0353
KAS $0.1092
TAO $382.3435
MKR $2726.6998
USDE $0.9992
GRT $0.2436
XMR $123.2867
XLM $0.1111
FET $2.0170
INJ $23.7176
THETA $2.0387
BTC $58379.9472
ETH $2982.7872
BNB $563.0335
SOL $134.7235
XRP $0.5177
stETH $2971.9755
DOGE $0.1303
TON $4.8905
ADA $0.4503
AVAX $33.3328
TRX $0.1205
wstETH $3474.4227
DOT $6.8866
WETH $2975.5564
WBTC $58376.0680
BCH $424.7496
LINK $13.3612
MATIC $0.6924
UNI $7.0434
ICP $13.2308
LTC $80.1663
DAI $1.0012
FDUSD $1.0026
CAKE $2.5276
RNDR $7.6591
IMX $2.0284
ETC $25.5672
NEAR $6.1572
HBAR $0.0999
FIL $5.7239
STX $2.1417
MNT $0.9501
PEPE $0.0000
OKB $48.7666
ATOM $8.7518
WIF $2.6145
VET $0.0353
KAS $0.1092
TAO $382.3435
MKR $2726.6998
USDE $0.9992
GRT $0.2436
XMR $123.2867
XLM $0.1111
FET $2.0170
INJ $23.7176
THETA $2.0387
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • New Android spyware collects complete user information


    Researchers at the security company Zimperium Labs have discovered a new Android spyware called RatMilad, which was created by cybercriminals in the Middle East and is used to spy on and steal user data. The stolen data can be used to access private corporate systems, blackmail the victim, and for other malicious purposes.

    Spyware is distributed through a fake NumRent virtual number generator. Once installed, the app asks for questionable permissions and then uses them to download the malicious RatMilad payload.

    The main distribution channel for the fake app is Telegram, since NumRent or other droppers that download RatMilad are not available on the Google Play store or third-party stores.

    The RatMilad operators also created a dedicated website to promote the mobile RAT Trojan to make the app look more convincing. This website is advertised on Telegram and other social networks.

    Once installed on the victim's device, RatMilad steals the following data:

    • Basic information about the device (model, brand, buildID, Android version);
    • MAC address of the device;
    • List of contacts;
    • SMS;
    • Call logs;
    • Account names and permissions;
    • List of installed applications and permissions;
    • Clipboard data;
    • GPS location data;
    • Information about the SIM card (number, country, IMEI, region);
    • List of files and their contents.

    RatMilad can perform actions on files such as:

    • Deletion and theft of files;
    • Changing application permissions;
    • Using the device's microphone to record sound.

    RatMilad spyware is designed to run silently in the background without arousing suspicion. According to experts, RatMilad operators received the source code from the AppMilad Telegram channel. Zimperium researchers concluded that RatMilad operators attack random targets and do not conduct targeted campaigns.

    Author DeepWeb
    Nihon Keizai: Japanese infrastructure vulnerable to cyber attacks
    Grouping BlackByte learned how to disable security systems using a legitimate driver

    Comments 0

    Add comment