New Android malware is able to take over your smartphone. It is currently sold for $ 29.99 on the dark web and does not require advanced hacking knowledge to use.
Credit: Unsplash
Malware of the type RAT, for “Remote Administration Tool”, is a virus allowing the hacker to control the smartphone of the victim. Using a keylogger, it is then possible for him to recover passwords used on various websites and applications. We remember in particular GravityRAT which spies on the SMS, photos and calls of its victims. The particularity of this malware is that it is completely undetectable by the infected device.
A combination of two former RATs, titled “Snape“Recently surfaced on the dark web. Most worrying is undoubtedly that the latter is sold for the modest sum of $ 29.99 on some forums. Like the data of 73 million Internet users, anyone can get a dangerous tool which gives him the possibility of stealing sensitive data. Especially since experts believe that this is relatively easy to use : all you have to do is get the victim to download it, and the malware does the rest.
Rogue malware takes full control of your smartphone
Snape is particularly vicious as he leaves little choice to his victim. Once downloaded to the smartphone, it repeatedly requests the necessary permissions to take control and this, until user acceptance. The malware then only has to configure itself as the administrator of the device. If the victim tries to cancel the setting, the message “Are you sure you want to erase all data?” appears, which, of course, discourages the greatest number.
Read also: Play Store – 13 apps downloaded 250 million times have a serious security breach
Snape installs its own notification system in order to intercept those received by the user and thus examine the data that may be stolen. It is therefore particularly recommended to download the latest Android security patch to avoid getting infected with this particularly dangerous malware. It is also better to remain vigilant about to applications from an unrecognized source, in particular to the permissions they request.
Source: Checkpoint