Rafel RAT Compromises Outdated Android Phones via Ransomware Attacks 

2 Mins Read

PureVPNNewsRafel RAT Compromises Outdated Android Phones via Ransomware Attacks 

Rafel RAT, an open-source Android malware, is making headlines for its attacks on older Android devices, leveraging them for ransomware operations. It has caught the attention of cybersecurity experts due to its widespread use by various cybercriminal groups to target devices no longer supported by regular security updates.

Such outdated devices are prone to attacks because they cannot defend against newly discovered vulnerabilities. With an alarming reach across devices globally, understanding this threat is crucial for all Android users. Find out more about Rafel RAT and how you can keep your device safe below!

The Extent and Impact of Rafel RAT 

Check Point researchers Antonis Terefos and Bohdan Melnykov have identified more than 120 campaigns deploying Rafel RAT. They have traced back some of these campaigns to well-known threat actors like APT-C-35 (also known as DoNot Team), with Iran and Pakistan determined as main sources of these attacks.

Rafel RAT has managed to infiltrate high-profile organizations in sectors like the government and military, with victims primarily spanning the United States, China, and Indonesia. Devices compromised by Rafel run on Android 11 or earlier versions – these make up over 87.5% of the affected devices. 

The remaining 12.5% are on newer operating systems, namely Android 12 and 13. In terms of device vulnerability, affected models include Samsung Galaxy, Google Pixel, Xiaomi Redmi, Motorola One, and others from OnePlus, Vivo, and Huawei. This essentially means that no brand is safe from Rafel RAT.

Top models targeted by Rafel RAT (Source: Check Point)

Rafel RAT’s Attack Vectors and Commands

The malware spreads by masquerading as legitimate applications from trusted brands like Instagram, WhatsApp, and various e-commerce and antivirus apps. It tricks users into downloading malicious APK files that request excessive permissions, such as disabling battery optimization to run undetected in the background.

Once installed, Rafel RAT can execute several harmful actions:

Command Description
ransomwareInitiates encryption of files on the device.
wipeRemoves all files from the specified directory.
LockTheScreenLocks the device screen, making it unusable.
sms_okuTransmits all SMS messages (and 2FA codes) to the C2 server.
location_trackerSends real-time location of the device to the C2 server.

Threat actors use a central panel to see device and status information and decide what to do next. In approximately 10% of the cases observed, Rafel RAT issued a ransomware command, according to Check Point’s analysis.

Rafel RAT’s central panel (Source: Check Point)

Protective Measures Against Rafel RAT

To stay safe against Rafel RAT, Android users should:

  • Avoid downloading APKs from unverified sources, especially if you have an outdated Android device.
  • Always scan news apps using Google’s Play Protect before using them.
  • Do not click on suspicious links in emails or text messages.
  • Stay updated on the latest Android versions.
author

Anas Hasan

date

June 24, 2024

time

1 year ago

Anas Hassan is a tech geek and cybersecurity enthusiast. He has a vast experience in the field of digital transformation industry. When Anas isn’t blogging, he watches the football games.

Have Your Say!!