Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
We Smell Another RAT; Novel Trojan Can Really Stink Up Your Android Device
Facebook   X   LinkedIn   Email

We Smell Another RAT; Novel Trojan Can Really Stink Up Your Android Device

September 19, 2023

It’s gotten rather stinky for Android users. Discovered and named by Trend Micro in June 2023, the MMRat trojan is a novel malware that is really making those devices smell ripe. It mainly takes advantage of a seldom-used communication method to steal data—particularly banking and financial data. And somehow, the victims are nose-blind and don’t smell a thing while it’s all happening.

Unfortunately, not a lot is known about this Remote Access Trojan (RAT). However, preliminary research by Trend Micro indicates that it is promoted via websites that mimic official app stores. The apps are mainly for dating and official government business.

Once the app is installed and compromises your device—which it does by abusing the little-used Accessibility Services—it monitors your activity and allows the hackers to collect the following information:

  • The user inputs through key logs
  • Screen, network, and battery information
  • Contact lists
  • Installed applications
  • Live stream and camera data
  • Real-time screen content

The functionality of MMRat malware relies on efficient data transfer. To achieve this, the MMRat authors have created a custom command and Control (C2) server Protobuf protocol to handle this. And that’s what this RAT uses. This custom protocol, as well as others, also makes it easy for hackers to evade detection by network security that looks for anomalies.

By monitoring the phone, hackers discover periods of idleness when they can conduct real-time bank fraud. Once it has completed its tasks, it can uninstall itself and delete evidence of malware compromise. And Bam! It just stole your cheese.

While this new Android trojan is mainly attacking consumers in Southeast Asia, it is bound to spread across the globe, considering how effective it seems to be at stealing banking data while remaining unnoticeable. With this in mind, you should take concerted effect to protect your private data from this and all other trojans.

The best way to mitigate this is to avoid installing apps from unknown sources. Using a sideloading application or process can be convenient, but it is also risky as the apps are not rigorously tested and authenticated to be devoid of malware. Download applications from official stores such as the Samsung Galaxy Store, Amazon Appstore, and Google Play Store.

Make sure when you do download apps, you don’t give them more permissions than they need. It’s a very rare event that an app needs access to the accessibility services and it’s even more rare that they need administrator rights. So, don’t grant them.

Additionally, you can and should use antivirus apps with a database of viruses that are continuously updated. Such a product will help protect your phone from MMRat and any divergent versions of the malware moving forward, as well as other types of malware that are scurrying around out there.


Has Your Account Been Compromised? Five Cyber Smart Tips Everyone Can Use

Your Security

Has Your Account Been Compromised? Five Cyber Smart Tips Everyone Can Use

The transition to living life through our devices has become very real for scores of people and businesses. By now, the coronavirus has changed our lives in ways we never expected. This transition includes doing most things from home. Unfortunately, adapting to online life also gives bad actor’s a cornucopia of targets to exploit. There are proactive steps to take when you suspect an account may be compromised, including ways to help keep it from happening to begin with. READ FULL STORY

One Billion+ Android App Downloads Are Hiding Banking Trojans. Is One Yours?

Mobile Security

One Billion+ Android App Downloads Are Hiding Banking Trojans. Is One Yours?

With over one billion trojan banking malware downloads from 639 apps on Google Play Store, it’s time for mobile Android users to pay attention. After all, it’s ultimately the victims who end up paying the price for Google not finding the malware before making it available on their Play Store. Despite Google’s recently improved efforts to keep malware out of their App Store, like introducing Play Protect, it appears there’s a lot more work to be done. READ FULL STORY

Shut The Door! Don't Leave Your Network Open To Account Takeovers

Corporate Security

Shut The Door! Don't Leave Your Network Open To Account Takeovers

If your company is like most, it has seventeen sets of login credentials floating around online. According to a study by Arctic Wolf, those credentials exposed in data breaches or other cybercrimes are always welcome on the dark web. They’re typically for sale, but often offered for free, and anyone interested in using them has a digital buffet of login data at their disposal. Arctic Wolf’s report, “2020 Security Operations” sheds light on account takeovers and how easily they can be launched. READ FULL STORY

WinRAR Users Urged To Update Due To High-Risk And Zero-Day Vulnerabilities

Your Security

WinRAR Users Urged To Update Due To High-Risk And Zero-Day Vulnerabilities

If you are among the 500 million users of WinRAR, the world's most popular compression tool, it's time to update your software. A recent vulnerability, rated high in severity, could put your system at risk. RARLAB, the developer behind WinRAR, has released a new version—WinRAR 6.23—that addresses this critical issue, as well as one that was discovered earlier in the summer. And it should be applied immediately, as the cybercriminals are already taking advantage of both of them. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...