• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us
  • Block Examples
  • Landing Page

iHash

News and How to's

  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Experts Sound Alarm On New Android Malware Sold On Hacking Forums

Jan 12, 2021 by iHash Leave a Comment

android malware

Cybersecurity researchers have exposed the operations of an Android malware vendor who teamed up with a second threat actor to market and sell a remote access Trojan (RAT) capable of device takeover and exfiltration of photos, locations, contacts, and messages from popular apps such as Facebook, Instagram, WhatsApp, Skype, Telegram, Kik, Line, and Google Messages.

The vendor, who goes by the name of “Triangulum” in a number of darknet forums, is alleged to be a 25-year-old man of Indian origin, with the individual opening up shop to sell the malware three years ago on June 10, 2017, according to an analysis published by Check Point Research today.

“The product was a mobile RAT, targeting Android devices and capable of exfiltration of sensitive data from a C&C server, destroying local data – even deleting the entire OS, at times,” the researchers said.

An Active Underground Market for Mobile Malware

Piecing together Triangulum’s trail of activities, the cybersecurity firm said the malware developer — aside from drumming up publicity for the RAT — also looked for potential investors and partners in September 2017 to show off the tool’s features before offering the tool for sale.

Triangulum, subsequently, is believed to have gone off the grid for about a year-and-a-half, with no signs of activity on the darknet, only to resurface on April 6, 2019, with another product called “Rogue,” this time in collaboration with another adversary named “HeXaGoN Dev,” who specialized in the development of Android-based RATs.

Noting that Triangulum had previously purchased several malware products offered by HeXaGoN Dev, Check Point said Triangulum advertised his products on different darknet forums with well-designed infographics listing the full features of the RAT. Furthermore, HeXaGoN Dev posed as a potential buyer in a bid to attract more customers.

While the 2017 product was sold for a flat $60 as a lifetime subscription, the vendors pivoted to a more financially-viable model in 2020 by charging customers anywhere between $30 (1 month) to $190 (permanent access) for the Rogue malware.

Interestingly, Triangulum’s attempts to expand to the Russian darknet market were met with failure following the actor’s refusal to share demo videos on the forum post advertising the product.

From Cosmos to Dark Shades to Rogue

Rogue (v6.2) — which appears to be the latest iteration of a malware called Dark Shades (v6.0) that initially sold by HeXaGoN Dev before being purchased by Triangulum in August 2019 — also comes with features taken from a second malware family called Hawkshaw, whose source code became public in 2017.

“Triangulum didn’t develop this creation from scratch, he took what was available from both worlds, open-source and the darknet, and united these components,” the researchers said.

Dark Shades, as it turns out, is a “superior successor” to Cosmos, a separate RAT sold by the HeXaGoN Dev actor, thus making the sale of Cosmos redundant.

Rogue is marketed as a RAT “made to execute commands with incredible features without a need of computer (sic),” with additional capabilities to control the infected clients remotely using a control panel or a smartphone.

Indeed, the RAT boasts of a wide range of features to gain control over the host device and exfiltrate any kind of data (such as photos, location, contacts, and messages), modify the files on the device, and even download additional malicious payloads, while ensuring that the user grants intrusive permissions to carry out its nefarious activities.

It’s also engineered to thwart detection by hiding the icon from the user’s device, circumvent Android security restrictions by exploiting accessibility features to log user actions, and registers its own notification service to snoop on every notification that pops up on the infected phone.

What’s more, stealth is built into the tool. Rogue uses Google’s Firebase infrastructure as a command-and-control (C2) server to disguise its malicious intentions, abusing the platform’s cloud messaging feature to receive commands from the server, and Realtime Database and Cloud Firestore to upload amassed data and documents from the victim device.

Rogue Suffered a Leak in April 2020

Triangulum may be currently active and expanding his clientele, but in April 2020, the malware ended up getting leaked.

ESET researcher Lukas Stefanko, in a tweet on April 20 last year, said the backend source code of the Rogue Android botnet was published in an underground forum, noting “it has lot of security issues,” and that “it is new naming for Dark Shades V6.0 (same developer).”

But despite the leakage, Check Point researchers note that the Triangulum team still receives messages on the actor’s home Darknet forum from interested customers.

“Mobile malware vendors are becoming far more resourceful on the dark net. Our research gives us a glimpse into the craziness of the dark net: how malware evolves, and how difficult it is to now track, classify and protect against them in an effective way,” Check Point’s Head of Cyber Research, Yaniv Balmas, said.

“The underground market is still like the wild-west in a sense, which makes it very hard to understand what is a real threat and what isn’t.”

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: alarm, Android, computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, Experts, Forums, hacker news, hacking, hacking news, how to hack, information security, Malware, network security, ransomware malware, software vulnerability, Sold, Sound, the hacker news

Special Offers

  • Swarovski Vintage Swan Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $52

    Swarovski Vintage Swan Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $52
  • Accordina Ambient LED Collapsible Wireless Phone Charger for $29

    Accordina Ambient LED Collapsible Wireless Phone Charger for $29
  • Swarovski "Bee A Queen" Rhodium-Plated Crystal Necklace & Earring Set (Store-Display Model) for $84

    Swarovski "Bee A Queen" Rhodium-Plated Crystal Necklace & Earring Set (Store-Display Model) for $84
  • Swarovski New Love Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $65

    Swarovski New Love Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $65
  • TiVo Bolt OTA for Antenna Allin-One Live TV DVR and Streaming Apps Device 1000GB (Used, Damaged Retail Box) for $279

    TiVo Bolt OTA for Antenna Allin-One Live TV DVR and Streaming Apps Device 1000GB (Used, Damaged Retail Box) for $279

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Accordina Ambient LED Collapsible Wireless Phone Charger for $29

Apr 14, 2021 By iHash

Desktop Window Manager vulnerability CVE-2021-28310 exploited ITW

Desktop Window Manager vulnerability CVE-2021-28310 exploited ITW

Apr 14, 2021 By iHash

Tags

* Apple computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPad iPhone iPhone 6 Malware microsoft network security OS X Yosemite Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news update video web applications
Copyright iHash.eu © 2021
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.