Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 2, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 2, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 2, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 2, 2025

      How Red Hat just quietly, radically transformed enterprise server Linux

      June 2, 2025

      OpenAI wants ChatGPT to be your ‘super assistant’ – what that means

      June 2, 2025

      The best Linux VPNs of 2025: Expert tested and reviewed

      June 2, 2025

      One of my favorite gaming PCs is 60% off right now

      June 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      `document.currentScript` is more useful than I thought.

      June 2, 2025
      Recent

      `document.currentScript` is more useful than I thought.

      June 2, 2025

      Adobe Sensei and GenAI in Practice for Enterprise CMS

      June 2, 2025

      Over The Air Updates for React Native Apps

      June 2, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      You can now open ChatGPT on Windows 11 with Win+C (if you change the Settings)

      June 2, 2025
      Recent

      You can now open ChatGPT on Windows 11 with Win+C (if you change the Settings)

      June 2, 2025

      Microsoft says Copilot can use location to change Outlook’s UI on Android

      June 2, 2025

      TempoMail — Command Line Temporary Email in Linux

      June 2, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Btmob RAT: A New Evolution of Android Malware Targets Users via Phishing Sites

    Btmob RAT: A New Evolution of Android Malware Targets Users via Phishing Sites

    February 12, 2025

    Btmob RAT

    A newly discovered Android malware, Btmob RAT, has been identified as a major threat to mobile users.

    The malware evolved from an earlier strain, SpySolr, and carries multiple advanced capabilities to target its victims. Leveraging phishing sites as its primary distribution method, Btmob RAT exploits Android’s Accessibility Service to steal credentials, take control of devices remotely, and perform a range of malicious actions.

    The malware also shares several similarities with other Android threats like Crax RAT and has raised concerns among security researchers.

    Btmob RAT’s Evolution and Capabilities

    BTMOB RAT announcement on the SpySolr Telegram Channel (Source: Cyble)

    Btmob RAT is part of a growing trend in sophisticated Android malware targeting mobile users. Discovered by Cyble Research and Intelligence Labs (CRIL) on January 31, 2025, and reported today, Btmob RAT is actively spreading through phishing sites, particularly those impersonating popular streaming platforms such as iNat TV and fake cryptocurrency mining websites.

    The malware is designed to exploit Android’s Accessibility Services to initiate a range of malicious activities, including remote control, credential theft, data exfiltration, and even device unlocking. What makes Btmob RAT particularly interesting is its seamless integration with WebSocket-based command and control (C&C) communication.

    This allows the malware to execute commands in real-time, facilitating the theft of sensitive data and providing attackers with control over infected devices. 

    How Btmob RAT Spreads

    Phishing sites have been identified as the primary distribution method for Btmob RAT. On January 31, Cyble analyzed an infected APK file named lnat-tv-pro.apk that was being distributed through a phishing site posing as iNat TV, an online streaming platform based in Turkey. The malware was flagged by SpySolr malware detection, which pointed to its connection to Crax RAT and its creator, a cybercriminal known as EVLF. 

    According to Cyble’s research, the malware sample downloaded from the phishing site connected to a WebSocket server at hxxp://server[.]yaarsa.com/con, revealing that it was running the latest version, BT-v2.5. This connection provided real-time control to the attacker, enabling actions such as screen sharing, keylogging, and data injection.

    The threat actor behind this malware is actively promoting Btmob RAT through Telegram, offering paid licenses and continuous updates for $5,000 with an additional $300 per month for ongoing support.

    How Btmob RAT Operates 

    Once Btmob RAT is installed on a victim’s device, it prompts the user to enable Accessibility Services. Once granted, the malware exploits this access to automate a variety of harmful actions. The WebSocket connection facilitates bidirectional communication between the infected device and the C&C server, allowing the malware to execute various commands and exfiltrate sensitive data.

    Hostinger

    The malware can also execute commands such as: 

    • Keylogging: Capturing typed input from the user. 
    • Credential Theft: Injecting fake login pages into legitimate apps and capturing user-entered data. 
    • Live Screen Sharing: Enabling attackers to view and control the device’s screen remotely. 
    • File Management: Downloading, deleting, and manipulating files on the infected device. 
    • Audio Recording: Accessing microphone data to record conversations. 

    Additionally, Btmob RAT can bypass security features, including device locks, and remotely unlock devices by simulating password or PIN inputs using Accessibility Services.

    A Threat Actor with a Persistent Focus: EVLF and Btmob RAT’s Future

    The cybercriminal known as EVLF is an active participant in the distribution of Btmob RAT and other malicious tools. Through Telegram, EVLF is continuously updating the Btmob RAT to enhance its functionality and evade detection. The malware’s ability to receive 16 different commands from its C&C server demonstrates a high level of flexibility and persistence. These commands enable the attacker to execute a range of malicious activities, from stealing contact lists and SMS messages to manipulating device audio settings. 

    The malware’s design and the involvement of EVLF indicate that Btmob RAT is not only a sophisticated tool but also a persistent threat. This ongoing evolution, driven by regular updates and the addition of new features, ensures that Btmob RAT will remain a matter concern for mobile device security.

    Btmob RAT Technical Details

    The technical workings of Btmob RAT involve several layers of control and exfiltration. When the malware is installed, it requests the user to grant Accessibility Service permissions. Once this permission is granted, the malware proceeds to manage the device’s operations, including granting itself additional permissions without user intervention. It then connects to a WebSocket server to initiate commands and receive updates. 

    • Command Types: The malware can receive five types of responses from the C&C server, including commands to execute actions, stop activities, or establish new connections. 
    • Data Exfiltration: It transmits various device details back to the C&C server, including the device name, OS version, battery status, and installed applications. 
    • WebView Injection: The malware injects fake login pages into apps, steals user-entered credentials, and sends them to the server for further exploitation. 

    The screen and ject commands further enhance Btmob RAT’s capabilities. The screen command enables live screen sharing, allowing attackers to view the victim’s device in real-time. The ject command handles HTML injections, allowing the malware to display phishing pages that capture sensitive data such as passwords and credit card details. 

    Recommendation and Mitigation Strategies

    Given the sophistication of Btmob RAT, Android users need to remain vigilant and adopt better cybersecurity measures. Here are several key recommendations to reduce the risk of infection: 

    1. Avoid Phishing Sites: Users should exercise caution when clicking on links received via email or SMS. Ensure the URL is legitimate before downloading any files or apps. 
    2. Enable Google Play Protect: Always ensure that Google Play Protect is enabled on Android devices to block potentially harmful apps. 
    3. Use Antivirus Software: Install reputable antivirus software to detect and remove Android malware like Btmob RAT. 
    4. Regularly Update Devices: Keeping Android devices up-to-date ensures that security vulnerabilities are patched promptly, reducing the risk of exploitation. 
    5. Enable Multi-factor Authentication (MFA): Always enable MFA for accounts where possible to add an extra layer of protection. 

    Conclusion

    The Btmob RAT is a serious and evolving threat to Android users. Building on the legacy of SpySolr and other malware like Crax RAT, this Android malware leverages advanced techniques to exploit Accessibility Services, steal sensitive data, and control devices remotely. As the threat actor behind Btmob RAT, EVLF, continues to update and promote the malware, users must take proactive steps to protect their devices and personal information. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMicrosoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries
    Next Article Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability

    Related Posts

    Security

    New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch

    June 3, 2025
    Security

    How One Path Traversal in Grafana Unleashed XSS, Open Redirect and SSRF (CVE-2025–4123)

    June 3, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Meet Unify AI: An AI Startup that Dynamically Routes Each User Prompt to the Best LLM for Better Quality, Speed, and Cost

    Development

    Harnessing Artificial Intelligence for the Next Era of Space Discovery

    Development

    Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent

    Development

    This is the power bank I recommend to most laptop users – even if you’re on a MacBook Pro

    News & Updates
    Hostinger

    Highlights

    Building a Legacy of Trust from Progressive Insurance to AWS

    May 30, 2025

    Balkan Bros Agency’s success is a story of long-term relationships, trust, and creative innovation. From a…

    Meet AnythingLLM: An Open-Source, All-in-One AI Desktop App for Local LLMs + RAG

    April 7, 2024

    Meet LOTUS 1.0.0: An Advanced Open Source Query Engine with a DataFrame API and Semantic Operators

    December 22, 2024

    CVE-2025-2421 – Profelis Informatics SambaBox Code Injection Vulnerability

    May 2, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.