A recently discovered Mobile Remote Access Trojan (MRAT) can take control of the infected Android devices and exfiltrate a trove of user data, Check Point security researchers warn.
Dubbed Rogue, the Trojan is the work of Triangulum and HeXaGoN Dev, known Android malware authors that have been selling their malicious products on underground markets for several years.
Triangulum, Check Point says, first shared a mobile RAT on a dark web forum in June 2017. The threat was capable of data exfiltration, but could also destroy data locally, and even erase the OS.
The developer started selling a piece of mobile malware several months later, and added another one to their portfolio after one year. Very active since, Triangulum likely created a “high-functioning production line for the development and distribution of malware,” Check Point says.
For the development of Rogue, the malware author apparently partnered with HexaGoN Dev, who specializes in the building of Android RATs. Previously, Triangulum purchased projects from NexaGoN Dev.
“The combination of HeXaGon Dev’s programming skills and Triangulum’s social marketing skills clearly posed a legitimate threat,” Check Point’s security researchers note.
Once it manages to compromise a device and gains all of the necessary permissions, the Rogue RAT hides its icon from the user, to ensure that it can’t be easily removed. The malware repeatedly asks for permissions until the user grants them.
The malware also registers as a device administrator and threatens to erase all data if the user attempts to revoke its admin permissions, by displaying the following message on the screen: “Are you sure to wipe all the data?”
To hide its malicious intentions, Rogue leverages Google’s Firebase platform, masquerading as a legitimate Google service. Firebase services serve as a command and control (C&C) server, meaning that all commands and data exfiltration are performed using Firebase’s infrastructure.
Of the dozens of services provided by Google Firebase to application developers, Rogue uses “Cloud Messaging” to receive commands, “Realtime Database” to upload data, and “Cloud Firestore” to upload files.
“The story of the Rogue malware is an example of how mobile devices can be exploited. Similar to Triangulum, other threat actors are perfecting their craft and selling mobile malware across the dark Web – so we need to stay vigilant for new threats,” Check Point concludes.
Related: Microsoft Warns of Android Ransomware Abusing Notification Services
Related: Firm’s MDM Server Abused to Deliver Android Malware to 75% of Its Devices
Related: ‘Cookiethief’ Android Malware Hijacks Facebook Accounts

More from Ionut Arghire
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- Apria Healthcare Notifying 2 Million People of Years-Old Data Breaches
- European Cybersecurity Firm Sekoia.io Raises $37.5 Million
- GitLab Security Update Patches Critical Vulnerability
- Android App With 50,000 Downloads in Google Play Turned Into Spyware via Update
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
