Arsink Rat Attacking Android Devices to Exfiltrate Sensitive Data and Enable Remote Access


A dangerous Android malware called Arsink RAT has emerged as a serious threat to mobile device security worldwide. This cloud-native Remote Access Trojan gives attackers complete control over infected devices while quietly stealing personal information.

The malware spreads through social media platforms like Telegram, Discord, and file-sharing sites such as MediaFire, disguising itself as popular apps to trick users into installation.

Arsink operates by pretending to be legitimate applications from well-known brands including Google, YouTube, WhatsApp, Instagram, Facebook, and TikTok.

Attackers distribute fake “mod” or “pro” versions of these apps, convincing victims they are downloading enhanced features.

Once installed, the malware requests excessive permissions and begins its surveillance activities without providing any real functionality.

The threat affects users globally, with approximately 45,000 unique victim IP addresses identified across 143 countries.

google

Zimperium analysts identified the malware campaign after tracking its rapid expansion over several months. The research team discovered 1,216 distinct malicious APK files and 317 Firebase Realtime Database endpoints used for command-and-control operations.

Most concerning is the scale of data theft occurring silently in the background. The malware captures SMS messages including one-time passwords, call logs, contacts, device location, and even audio recordings through the microphone.

Showing samples found over the period of time (Source - Zimperium)
Showing samples found over the period of time (Source – Zimperium)

The heaviest concentrations of infections appear in Egypt with roughly 13,000 compromised devices, followed by Indonesia with 7,000 cases, and Iraq and Yemen each reporting 3,000 infections.

Brands that were impersonated in this campaign (Source - Zimperium)
Brands that were impersonated in this campaign (Source – Zimperium)

Countries like Pakistan, India, and Bangladesh also show significant victim numbers, demonstrating the widespread nature of this threat.

Social Engineering Distribution Methods

Arsink’s distribution strategy relies heavily on social engineering techniques rather than technical exploits.

The attackers use multiple cloud services for different purposes, making detection more challenging. Some variants upload stolen files to Google Drive using Google Apps Script, while others send information directly to Telegram bots controlled by the attackers.

A third variant hides a secondary malicious payload inside the initial app, which gets extracted and installed without needing internet connectivity.

The malware maintains persistence on infected devices by hiding its app icon and running a foreground service that resists termination.

This allows continuous monitoring and data collection even when users think they have closed all apps.

Remote operators can trigger various actions including toggling the flashlight, making phone calls, uploading files, and even wiping all data from external storage as a destructive measure.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

googlenews



Source link