NewsTeam6/26/2024
Check Point Research (CPR) has identified multiple campaigns that leverage Rafel, an open-source Remote Administration Tool (RAT) targeting Android phones (used by more than 3.9B people worldwide). We discovered the use of this Android malware in espionage (remote surveillance, data exfiltration) and ransomware operations.
The victim is being tricked (through messages/conversations etc) to download apps that impersonate popular services (social media, financial, educational, and others), and by installing the apps, the malware is injected into the mobile phone, enabling different kinds of capabilities from espionage to ransomware. We’ve seen over 120 campaigns in a period of 2 years in multiple countries globally, bypassing several security procedures aimed at keeping these mobile users safe from hackers.
The campaigns compromised Android devices, mainly in the United States, China, Indonesia, Russia, India, France, Germany, United Kingdom.
Here are the main takeaways:
· Ransomware Operations: Instances of Rafel RAT being used to encrypt device files, demanding ransom for decryption.
· 2FA Bypass: The malware has also been linked to stealing two-factor authentication messages, potentially bypassing this critical security measure.
Safety Recommendations for Android Users:
Mode of Operation:
According to Alexander Chailytko, Cyber Security, Research & Innovation Manager at Check Point Software Technologies:
"Rafel RAT is another reminder of how open-source malware technology can cause significant damage, especially when targeting big ecosystems like Android, with over 3.9 billion users worldwide. As most of the affected victims are running unsupported Android versions, it is crucial to keep your devices up-to-date with the most recent security fixes or replace them if they are no longer receiving them, as prominent threat actors and even APT groups are always looking for ways to leverage their operations, especially with the readily available tools such as Rafel RAT, which could lead to critical data exfiltration, using leaked Two-Factor Authentication codes, surveillance attempts and covert operations, that are particularly devastating when used against high-profile targets.”