{"id":90700,"date":"2022-10-08T07:03:56","date_gmt":"2022-10-08T07:03:56","guid":{"rendered":"https:\/\/harchi90.com\/iranian-hackers-spreading-ratmilad-android-spyware-disguised-as-vpn-app\/"},"modified":"2022-10-08T07:03:56","modified_gmt":"2022-10-08T07:03:56","slug":"iranian-hackers-spreading-ratmilad-android-spyware-disguised-as-vpn-app","status":"publish","type":"post","link":"https:\/\/harchi90.com\/iranian-hackers-spreading-ratmilad-android-spyware-disguised-as-vpn-app\/","title":{"rendered":"Iranian Hackers Spreading RatMilad Android Spyware Disguised as VPN App"},"content":{"rendered":"
\n

An Iranian hacking group is using new Android spyware in an extensive campaign primarily targeting enterprise users, mobile security firm Zimperium has revealed.<\/p>\n

The group involved in this campaign goes by the name of \u201cAppMilad\u201d while the spyware being used is dubbed \u201cRatMilad.\u201d It can perform a wide range of malicious actions after it is installed on a victim’s device including functionalities like file manipulation, audio recording, and application permission modification.<\/p>\n

Spyware Detailed Analysis<\/h3>\n

According to Zimperium’s research, threat actors at AppMilad have devised the campaign to get the malicious app sideloaded onto unsuspecting users’ devices. Zimperium examined a spyware sample using the VPN<\/strong> and phone number spoofing app, which was identified as Text Me. <\/p>\n

Another live RatMilad sample was distributed through a Text Me variant called NumRent. Moreover, scammers have developed a product website to distribute the app and socially engineer targets to believe that it is a legit app.<\/p>\n

\n
\n