In the electronic environment, what’s beneficial right now can turn out to be unsafe tomorrow. Regretably, this is exactly what took place with iRecorder – Monitor Recorder. This display screen-recording Android application with about 50,000 installs was released in September 2021 as a legit application.
Nevertheless, the app now has a new Android remote access Trojan (RAT) primarily based on AhMyth. This open up-resource remote administration instrument can be utilised to entry informational information from an Android gadget, cybersecurity vendor ESET discovered on May 23, 2023.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
The RAT, which ESET scientists called AhRat, can exfiltrate information with precise extensions and microphone recordings and upload them to the attacker’s command and command (C2) server. The malicious code was very likely added when the app was up-to-date to edition 1.3.8, created readily available in August 2022.
The ESET scientists observed that while malicious Android applications are legion, incorporating malicious code to a authentic application is considerably far more uncommon.
“The application’s distinct destructive habits most likely implies its involvement in an espionage marketing campaign,” the investigate report reads.
AhMyth has been used by Clear Tribe, also acknowledged as APT36, a cyber espionage group regarded for its comprehensive use of social engineering techniques and focusing on of authorities and army businesses in South Asia.
“Nevertheless, we are not able to ascribe the recent samples to any particular group, and there are no indications that they have been developed by a recognized superior persistent menace (APT) group,” the scientists insisted in the report.
The Google Play security workforce taken off the app from its retail store just after currently being notified by ESET, a member of the Google App Protection Alliance.
“However, it is crucial to notice that the app can also be located on alternative and unofficial Android markets. In addition, the iRecorder developer also delivers other apps on Google Perform, but they never incorporate destructive code.”
The researchers have not but detected AhRat everywhere else in the planet.
Some elements of this write-up are sourced from:
www.infosecurity-journal.com