RatMilad: new Android malware can steal personal data and record audios

RatMilad, the new malware from android, is making waves in the Middle East. This most popular operating system spyware among smartphones is spying on users to steal personal data and practice blows.

Read more: See more about the virus that is stealing card data

see more

8 signs that demonstrate that anxiety was present in her…

School director intervenes delicately when noticing a student wearing a cap in…

The discovery of the new Android malware was made by a cybersecurity company called Zimperium. In a note, she warned that spyware can be used for cyber espionage, extortion and to infiltrate the conversations of Android users.

Zimperium's report reports the malware's modus operandi, and highlights that the consequences linked to data theft can be dangerous. Access to corporate systems or blackmail can be among the attitudes adopted by hackers.

Be careful when downloading apps to prevent you from being spied on

Typically, malware reaches mobile devices through some action taken by the victim. In the case of RatMilad, the spyware reaches cell phones through the Num Rent application, which generates false numbers to activate accounts on social networks. After installation, the application requests permissions for a series of user data, and that's how it adds the spyware to the cell phone.

It is important to note that this application is not available on the Play Store, as it contains risky settings. In this way, users are usually able to download the app through channels on Telegram.

See what data RatMilad can access

Once installed on the device, the RatMilad spyware camouflages itself through a VPN connection, a virtual network private in order to hide where the user is connecting from, and has access to the following data from your cell phone:

  • Basic device information (model, brand, buildID, Android version);
  • Device MAC address;
  • Contact list;
  • SMS;
  • Call log;
  • Account names and permissions;
  • List of installed apps and permissions;
  • Clipboard data;
  • GPS location data;
  • SIM information (number, country, IMEI, state);
  • List of files;
  • File content;
  • Stealing or deleting files, modifying application permissions and even using the cell phone's microphone to record audios are some of the malicious practices of spyware.

The application runs silently, so the victim does not arouse suspicion. To protect yourself, only download apps from the Play Store and review the requested permissions when installing an app.

Why the color of urine

Urine is proof that our kidneys are working properly, it is the result of the work of purifying t...

read more
Alkyne hydration. Organic Alkyne Hydration Reaction

Alkyne hydration. Organic Alkyne Hydration Reaction

The hydration of alkynes is a reaction of addition of water molecules in an acidic medium in the ...

read more
Rotating system - moment of inertia

Rotating system - moment of inertia

According to Newton's Second Law, when we apply a force to an object that contains mass, it acqu...

read more
instagram viewer