Indian Android users warned about the DogeRAT trojan threats

May 31, 2023
India Android Mobile Users Threat Advisory DogeRAT Trojan Malware Cyber Threat

DogeRAT, an emerging open-source remote access trojan (RAT), has recently emerged as a significant threat targeting Android users in India through a highly sophisticated malware campaign.

Operating under the cover of seemingly legitimate applications such as Opera Mini, OpenAI ChatGOT, and Premium versions of popular platforms like YouTube, Netflix, and Instagram, this malware exploits social media and messaging platforms to propagate its malicious intent.

Once successfully installed on a victim’s device, this malware obtains illicit access to highly sensitive data, such as personal contacts, confidential messages, and critical banking credentials. Moreover, it can seize control of the compromised device, thereby unleashing a series of malicious activities, including the dissemination of spam messages, unauthorised financial transactions, manipulation of crucial files, and remote capture of photos utilising the device’s integrated cameras.

 

Its India-based developer has promoted the DogeRAT malware-as-a-service (MaaS) through a Telegram channel with over 2,100 subscribers since June 9, 2022.

 

The Telegram channel promotes DogeRAT and provides a premium subscription at remarkably low prices ($30), offering enhanced features like screenshot capture, image theft, clipboard content retrieval, and keystroke logging.

To expand its reach to a wider range of malicious actors, the developer has made the free version of DogeRAT accessible on GitHub, accompanied by screenshots and video tutorials demonstrating its functionalities.

However, the developer disclaims any endorsement of illegal or unethical use of the tool, stating that users bear full responsibility for its utilisation in the README[.]md file of the repository.

Once installed, the Java-based malware subtly prompts users for intrusive permissions, enabling it to execute its data-gathering objectives, quickly transmitted to a dedicated Telegram bot for extraction.

This campaign serves as a reminder of scammers’ pursuit of financial gain, driving them to continually refine and adapt their tactics.

In their quest for illicit profits, scammers have outdone conventional approaches like phishing websites, now focusing on distributing modified RATs or repurposing malicious apps. These deceptive scam campaigns are characterised by their cost-effectiveness, simplicity of setup, and yet remarkably high returns, posing a significant threat to unsuspecting users.

About the author

Leave a Reply