Article Details

Scrape Timestamp (UTC): 2024-06-24 05:09:08.547

Source: https://thehackernews.com/2024/06/iranian-hackers-deploy-rafel-rat-in.html

Original Article Text

Click to Toggle View

Iranian Hackers Deploy Rafel RAT in Android Ransomware Operation. Multiple threat actors, including cyber espionage groups, are employing an open-source Android remote administration tool called Rafel RAT to meet their operational objectives by masquerading it as Instagram, WhatsApp, and various e-commerce and antivirus apps. "It provides malicious actors with a powerful toolkit for remote administration and control, enabling a range of malicious activities from data theft to device manipulation," Check Point said in an analysis published last week. It boasts a wide range of features, such as the ability to wipe SD cards, delete call logs, siphon notifications, and even act as ransomware. The use of Rafel RAT by DoNot Team (aka APT-C-35, Brainworm, and Origami Elephant) was previously highlighted by the Israeli cybersecurity company in cyber attacks that leveraged a design flaw in Foxit PDF Reader to trick users into downloading malicious payloads. The campaign, which took place in April 2024, is said to have utilized military-themed PDF lures to deliver the malware. Check Point said it identified around 120 different malicious campaigns, some targeting high-profile entities, that span various countries like Australia, China, Czechia, France, Germany, India, Indonesia, Italy, New Zealand, Pakistan, Romania, Russia, and the U.S. "The majority of victims had Samsung phones, with Xiaomi, Vivo, and Huawei users comprising the second-largest group among the targeted victims," it noted, adding no less than 87.5% of the infected devices are running out-of-date Android versions that no longer receive security fixes. Typical attack chains involve the use of social engineering to manipulate victims into granting the malware-laced apps intrusive permissions in order to hoover sensitive data like contact information, SMS messages (e.g., 2FA codes), location, call logs, and the list of installed applications, among others. Rafel RAT primarily makes use of HTTP(S) for command-and-control (C2) communications, but it can also utilize Discord APIs to contact the threat actors. It also comes with an accompanying PHP-based C2 panel that registered users can leverage to issue commands to compromised devices. The tool's effectiveness across various threat actors is corroborated by its deployment in a ransomware operation carried out by an attacker likely originating from Iran, who sent a ransom note written in Arabic through an SMS that urged a victim in Pakistan to contact them on Telegram. "Rafel RAT is a potent example of the evolving landscape of Android malware, characterized by its open-source nature, extensive feature set, and widespread utilization across various illicit activities," Check Point said. "The prevalence of Rafel RAT highlights the need for continual vigilance and proactive security measures to safeguard Android devices against malicious exploitation." Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.

Daily Brief Summary

MALWARE // Iranian Cyber Espionage Uses Rafel RAT for Widespread Android Attacks

Multiple cyber espionage groups, including Iranian threat actors, are exploiting an open-source Android RAT named Rafel RAT disguised as popular apps like Instagram and WhatsApp.

Rafel RAT enables attackers to perform various malicious tasks including wiping SD cards, deleting call logs, stealing notifications, and acting as ransomware.

A significant cyber attack in April 2024 by DoNot Team utilized Rafel RAT, exploiting vulnerabilities in Foxit PDF Reader with military-themed PDF lures.

Check Point Research identified around 120 different malicious campaigns using Rafel RAT targeting various international locations like the U.S., Australia, and China.

Predominantly, victims with out-of-date Android phones from manufacturers like Samsung, Xiaomi, Vivo, and Huawei were targeted, comprising 87.5% of infected devices.

Attack methods include social engineering to persuade victims to grant intrusive permissions, allowing theft of sensitive data such as SMS messages and contact info.

Rafel RAT communicates with threat actors via HTTP(S) and Discord APIs, and features a PHP-based control panel for attackers.

The surge in Rafel RAT incidents stresses the urgent need for increased vigilance and improved security practices to protect Android devices.