Security News > 2023 > September > Transparent Tribe Uses Fake YouTube Android Apps to Spread CapraRAT Malware

The suspected Pakistan-linked threat actor known as Transparent Tribe is using malicious Android apps mimicking YouTube to distribute the CapraRAT mobile remote access trojan, demonstrating the continued evolution of the activity.
Transparent Tribe, also known as APT36, is known to target Indian entities for intelligence-gathering purposes, relying on an arsenal of tools capable of infiltrating Windows, Linux, and Android systems.
A crucial component of its toolset is CapraRAT, which has been propagated in the form of trojanized secure messaging and calling apps branded as MeetsApp and MeetUp.
These weaponized apps are distributed using social engineering lures.
The latest set of Android package files discovered by SentinelOne are engineered to masquerade as YouTube, one of which reaches out to a YouTube channel belonging to "Piya Sharma."
Once installed, the apps request intrusive permissions that allow the malware to harvest a wide range of sensitive data and exfiltrate it to an actor-controlled server.
News URL
https://thehackernews.com/2023/09/transparent-tribe-uses-fake-youtube.html
Related news
- Crypto-stealing iOS, Android malware found on App Store, Google Play (source)
- SpyLend Android malware downloaded 100,000 times from Google Play (source)
- Vo1d malware botnet grows to 1.6 million Android TVs worldwide (source)
- BadBox malware disrupted on 500K infected Android devices (source)
- North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps (source)
- YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users (source)
- New Android malware uses Microsoft’s .NET MAUI to evade detection (source)
- APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware (source)
- Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection (source)
- New Crocodilus malware steals Android users’ crypto wallet keys (source)