

Avoiding side-loading apps and keeping the device up to date are recommended measures to safeguard Android devices. The malware has been distributed through Telegram channels, with a premium version capable of extracting images from devices, acting as a keylogger, and even taking screenshots without user consent. It can then be used to carry out various malicious activities such as unauthorized payments, spam messages, automatically taking pictures, and changing files, without any alert being sent out to the users. It asks device users for permission to access call logs, media, and messages, impersonating legitimate apps. The malware exploits open-source software to worm through vulnerabilities in Android devices and can extract sensitive information, including call logs, contacts, and banking data. The malware has been found to impersonate BFSI, entertainment, and ecommerce apps on Android devices. DogeRAT is a complex malware that spreads through the use of unofficial app marketplaces and vulnerable websites, remotely compromising a device’s camera, contacts, and apps.Ī new, complex malware named DogeRAT has been noted by security researchers at contextual AI firm, CloudSEK.The Daam malware interacts with APK files on Android devices to read history and call logs, change passwords, and access phone cameras and contact lists.
