RatMilad, the new malware from android, is making waves in the Middle East. This most popular operating system spyware among smartphones is spying on users to steal personal data and practice blows.
Read more: See more about the virus that is stealing card data
see more
8 signs that demonstrate that anxiety was present in her…
School director intervenes delicately when noticing a student wearing a cap in…
The discovery of the new Android malware was made by a cybersecurity company called Zimperium. In a note, she warned that spyware can be used for cyber espionage, extortion and to infiltrate the conversations of Android users.
Zimperium's report reports the malware's modus operandi, and highlights that the consequences linked to data theft can be dangerous. Access to corporate systems or blackmail can be among the attitudes adopted by hackers.
Be careful when downloading apps to prevent you from being spied on
Typically, malware reaches mobile devices through some action taken by the victim. In the case of RatMilad, the spyware reaches cell phones through the Num Rent application, which generates false numbers to activate accounts on social networks. After installation, the application requests permissions for a series of user data, and that's how it adds the spyware to the cell phone.
It is important to note that this application is not available on the Play Store, as it contains risky settings. In this way, users are usually able to download the app through channels on Telegram.
See what data RatMilad can access
Once installed on the device, the RatMilad spyware camouflages itself through a VPN connection, a virtual network private in order to hide where the user is connecting from, and has access to the following data from your cell phone:
- Basic device information (model, brand, buildID, Android version);
- Device MAC address;
- Contact list;
- SMS;
- Call log;
- Account names and permissions;
- List of installed apps and permissions;
- Clipboard data;
- GPS location data;
- SIM information (number, country, IMEI, state);
- List of files;
- File content;
- Stealing or deleting files, modifying application permissions and even using the cell phone's microphone to record audios are some of the malicious practices of spyware.
The application runs silently, so the victim does not arouse suspicion. To protect yourself, only download apps from the Play Store and review the requested permissions when installing an app.