• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
transparent tribe uses fake youtube android apps to spread caprarat

Transparent Tribe Uses Fake YouTube Android Apps to Spread CapraRAT Malware

You are here: Home / General Cyber Security News / Transparent Tribe Uses Fake YouTube Android Apps to Spread CapraRAT Malware
September 19, 2023

The suspected Pakistan-connected danger actor recognised as Transparent Tribe is utilizing malicious Android applications mimicking YouTube to distribute the CapraRAT mobile remote entry trojan (RAT), demonstrating the continued evolution of the action.

“CapraRAT is a highly invasive tool that provides the attacker management above a great deal of the details on the Android equipment that it infects,” SentinelOne security researcher Alex Delamotte reported in a Monday evaluation.

Transparent Tribe, also regarded as APT36, is acknowledged to target Indian entities for intelligence-accumulating uses, relying on an arsenal of resources capable of infiltrating Windows, Linux, and Android methods.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

A important ingredient of its toolset is CapraRAT, which has been propagated in the sort of trojanized protected messaging and contacting apps branded as MeetsApp and MeetUp. These weaponized applications are distributed making use of social engineering lures.

The newest established of Android deal (APK) files found out by SentinelOne are engineered to masquerade as YouTube, 1 of which reaches out to a YouTube channel belonging to “Piya Sharma.”

The application is named soon after its namesake, indicating that the adversary is employing romance-based mostly phishing methods to entice targets into setting up the applications. The record of applications is as follows –

  • com.Foundation.media.service
  • com.moves.media.tubes
  • com.films.watchs.share

When set up, the applications ask for intrusive permissions that make it possible for the malware to harvest a wide assortment of sensitive info and exfiltrate it to an actor-managed server. CapraRAT is also able of initiating phone phone calls as well as intercepting and blocking incoming SMS messages.

“Clear Tribe is a perennial actor with trusted practices,” Delamotte explained. “The fairly small operational security bar allows swift identification of their equipment. People today and corporations related to diplomatic, armed forces, or activist issues in the India and Pakistan locations need to evaluate protection versus this actor and threat.”

Found this post appealing? Comply with us on Twitter  and LinkedIn to read through a lot more unique content we put up.


Some components of this write-up are sourced from:
thehackernews.com

Previous Post: «microsoft ai researchers accidentally expose 38 terabytes of confidential data Microsoft AI Researchers Accidentally Expose 38 Terabytes of Confidential Data
Next Post: Over 12,000 Juniper Firewalls Found Vulnerable to Recently Disclosed RCE Vulnerability over 12,000 juniper firewalls found vulnerable to recently disclosed rce»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.