DogeRAT and Daam Malware Threaten Android Devices

The DogeRAT malware is capable of impersonating entertainment, BFSI, and ecommerce apps on Android platforms.

May 31, 2023

Malware Threat on Android Devices
  • The Daam malware interacts with APK files on Android devices to read history and call logs, change passwords, and access phone cameras and contact lists.
  • DogeRAT is a complex malware that spreads through the use of unofficial app marketplaces and vulnerable websites, remotely compromising a device’s camera, contacts, and apps.

A new, complex malware named DogeRAT has been noted by security researchers at contextual AI firm, CloudSEK. The malware has been found to impersonate BFSI, entertainment, and ecommerce apps on Android devices.

The malware exploits open-source software to worm through vulnerabilities in Android devices and can extract sensitive information, including call logs, contacts, and banking data. It asks device users for permission to access call logs, media, and messages, impersonating legitimate apps.

It can then be used to carry out various malicious activities such as unauthorized payments, spam messages, automatically taking pictures, and changing files, without any alert being sent out to the users.

The malware has been distributed through Telegram channels, with a premium version capable of extracting images from devices, acting as a keylogger, and even taking screenshots without user consent. Avoiding side-loading apps and keeping the device up to date are recommended measures to safeguard Android devices.

See More: RaidForums Members Suffer the Same Fate as Their Victims

Daam Malware Capable of Circumventing Standard Security Precautions

The Daam malware is another recent threat to Android device users. It is capable of circumventing antivirus software and is even capable of inserting ransomware into affected devices.

Daam can retrieve a wide range of sensitive data, including messages, browsing history, images, call logs, and contact information. As it bypasses standard security protocols, it is difficult to identify and remove malware from devices.

The malware primarily spreads through third-party websites and uses Android-based APK files to infect devices. The malware steals device data from the device to the attacker’s servers, and the contents of the device are made inaccessible through AES encryption.

With more than 3.5 billion active Android devices worldwide, the financial incentive for malicious actors using such malware is likely to continue rising. Maintaining cyber hygiene best practices will remain critical for individuals and businesses for the foreseeable future.

What best practices do you follow to keep your Android devices safe? Let us know on LinkedInOpens a new window , TwitterOpens a new window , or FacebookOpens a new window . We would love to hear from you!

Image source: Shutterstock

LATEST NEWS STORIES

Anuj Mudaliar
Anuj Mudaliar is a content development professional with a keen interest in emerging technologies, particularly advances in AI. As a tech editor for Spiceworks, Anuj covers many topics, including cloud, cybersecurity, emerging tech innovation, AI, and hardware. When not at work, he spends his time outdoors - trekking, camping, and stargazing. He is also interested in cooking and experiencing cuisine from around the world.
Take me to Community
Do you still have questions? Head over to the Spiceworks Community to find answers.