News Software 06-24-2024 at 17:23 comment views icon

Ratel RAT ransomware attacks old Android smartphones, encrypting data and demanding ransom

author avatar
https://itc.ua/wp-content/uploads/2022/04/ad81c83e9fbf757ce8a90d0eb41dee5b-96x96.jpeg *** https://itc.ua/wp-content/uploads/2022/04/ad81c83e9fbf757ce8a90d0eb41dee5b-96x96.jpeg *** https://itc.ua/wp-content/uploads/2022/04/ad81c83e9fbf757ce8a90d0eb41dee5b-96x96.jpeg

Vadym Karpus

News writer

Cybercriminals have started attacking older Android devices using open source malware called Ratel RAT. In fact, it is a type of Android ransomware that encrypts or deletes data, locks the device, and demands payment on Telegram.

Check Point researchers report detecting more than 120 campaigns using Ratel RAT. The sources of the attacks include APT-C-35 (DoNot Team), Iran, and Pakistan. Attackers target high-ranking organizations, including those in the government and military sector, with most victims coming from the United States, China, and Indonesia.

Вимагач Ratel RAT атакує старі Android-смартфони, шифруючи дані та вимагаючи викуп

In most of the infections Check Point has investigated, victims were using an Android version that had reached the end of its support cycle and no longer received security updates. This includes Android 11 and older versions, which account for more than 87.5% of the total number of infected devices. Only 12.5% of infected devices are running Android 12 or 13. The victims are smartphones of various brands, including Samsung Galaxy, Google Pixel, Xiaomi Redmi, Motorola One, as well as devices from OnePlus, Vivo, and Huawei. This proves that Ratel RAT is an effective tool for attacking a number of different Android implementations.

Ratel RAT is spread in a variety of ways. Attackers typically use Instagram, WhatsApp, e-commerce platforms, and anti-virus applications to trick people into downloading malicious APK files. During the installation, the ransomware requests access to risky permissions to run in the background.

Вимагач Ratel RAT атакує старі Android-смартфони, шифруючи дані та вимагаючи викуп

Ratel RAT has several variants that differ in the list of commands they support. They usually do the following:

  • Ransomware: starts the process of encrypting files on the device.
  • wipe: deletes all files in the specified path.
  • LockTheScreen: Locks the device screen, making the device unusable.
  • sms_oku: leakage of all SMS (and 2FA codes) to the control server (C2).
  • location_tracker: transmits the current location of the device to the C2 server.

Actions are monitored from a centralized panel, where attackers can access device and status information and decide on the next steps of the attack.

According to Check Point’s analysis, in about 10% of cases, a command was issued to use ransomware. In this case, files are encrypted on the victim’s smartphone using a predefined AES key, after which the attackers demand a ransom.

Вимагач Ratel RAT атакує старі Android-смартфони, шифруючи дані та вимагаючи викуп

By gaining DeviceAdmin privileges, the ransomware has control over key functions of the device, such as the ability to change the screen lock password and add a special message to the screen, often a ransom message. If the user tries to revoke the administrator rights, the ransomware can react by changing the password and immediately locking the screen.


Loading comments...

Spelling error report

The following text will be sent to our editors: