• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new caprarat android malware targets indian government and military personnel

New CapraRAT Android Malware Targets Indian Government and Military Personnel

You are here: Home / General Cyber Security News / New CapraRAT Android Malware Targets Indian Government and Military Personnel
February 7, 2022

A politically inspired sophisticated persistent menace (APT) group has expanded its malware arsenal to consist of a new distant access trojan (RAT) in its espionage attacks aimed at Indian armed service and diplomatic entities.

Known as CapraRAT by Pattern Micro, the implant is an Android RAT that reveals a substantial “diploma of crossover” with one more Windows malware recognized as CrimsonRAT which is linked with Earth Karkaddan, a risk actor that is also tracked beneath the monikers APT36, Procedure C-Main, PROJECTM, Mythic Leopard, and Transparent Tribe.

The very first concrete signs of APT36’s existence appeared in 2016 as the team commenced distributing information-stealing malware by way of phishing email messages with destructive PDF attachments targeting Indian military and governing administration personnel. The group is thought to be of Pakistani origin and operational because at the very least 2013.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Automatic GitHub Backups

The danger actor is also identified to be constant in its modus operandi, with the attacks predominantly banking on social engineering and a USB-centered worm as entry factors. Amid prevalent elements in the group’s arsenal is a Windows backdoor termed CrimsonRAT that allows the attackers in depth accessibility to compromised programs, while current campaigns have progressed to deliver ObliqueRAT.

CapraRAT Android Malware

CrimsonRAT is fashioned as a .NET binary whose main function is to get and exfiltrate info from specific Windows systems, such as screenshots, keystrokes, and documents from detachable drives, and upload them to the attacker’s command-and-management server.

The new addition to its toolset is yet a further custom made Android RAT which is deployed by implies of phishing inbound links. CapraRAT, which is disguised as a YouTube app, is reported to be a modified variation of an open-source RAT termed AndroRAT and will come with a wide variety of info exfiltration functions, including the capacity to harvest victims’ locations, phone logs, and speak to data.

Prevent Data Breaches

This is far from the to start with time the hacking group has utilised Android RATs. In Could 2018, human rights defenders in Pakistan were being targeted by Android spy ware named StealthAgent to intercept phone phone calls and messages, siphon photographs, and observe their whereabouts.

Then in 2020, attack strategies mounted by Clear Tribe concerned leveraging military services-themed lures to drop a modified model of the AhMyth Android RAT that masqueraded as a porn-linked application and a fake model of the Aarogya Setu COVID-19 monitoring app.

To mitigate these types of attacks, buyers are advised to view out for unsolicited email messages, keep away from clicking on one-way links or downloading email attachments from unidentified senders, install apps only from trustworthy resources, and exercise warning when it comes to granting permissions asked for by the apps.

Discovered this short article intriguing? Adhere to THN on Facebook, Twitter  and LinkedIn to go through extra unique content we write-up.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «swissport ransomware attack leads to flight delays Swissport ransomware attack leads to flight delays
Next Post: Why software alone won’t solve the security crisis why software alone won’t solve the security crisis»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.