Cyber Security News

BIG SHARK Android RAT Cracked & Leaked from Chinese Market

A significant cybersecurity threat has emerged as the BIG SHARK Android Remote Access Trojan (RAT), a cracked version of the infamous Craxs 7.6 RAT, has been leaked online. 

This development highlights the evolving risks posed by malicious actors exploiting Android devices globally.

The BIG SHARK RAT is a derivative of the Craxs RAT, a highly sophisticated malware tool initially developed for remote control of Android devices. 

Craxs RAT has been linked to cybercrime activities such as banking fraud, cryptocurrency theft, and phishing campaigns. The cracked BIG SHARK version retains many of the original features but introduces slight modifications and protections.

It reportedly takes 20-30 seconds to initialize due to its embedded security mechanisms.

BIG SHARK Android Cracked & Leaked (Source: cyberfeeddigest shared on X)

This RAT enables attackers to:

  • Gain complete administrative control over infected devices.
  • Stealthily monitor user activity through screen capture and keylogging.
  • Exploit vulnerabilities for privilege escalation.
  • Deploy additional malware or ransomware payloads.

Technical Background of Craxs RAT

The Craxs RAT family, including BIG SHARK, is typically coded in C# for its server-side operations and Java for its Android APKs. 

These tools are often packed with obfuscation techniques such as DNGuard to evade detection by antivirus software. The cracked BIG SHARK version appears to mimic these characteristics, making it a potent threat.

The cracked BIG SHARK RAT has been shared on underground forums, with download links hosted on platforms like MediaFire and AnonymFile. These links are being circulated widely among cybercriminal communities. 

The malware is designed to infiltrate devices through malicious APK files disguised as legitimate apps, often distributed via phishing campaigns or fake websites.

Once installed, the RAT operates covertly, avoiding detection by traditional security measures. It provides attackers with capabilities such as:

  • Extracting sensitive data like login credentials and financial information.
  • Hijacking cameras and microphones for surveillance.
  • Using infected devices as proxies for further attacks.

Originally developed by a threat actor known as “EVLF,” its source code was leaked in 2020, leading to numerous customized variants. 

Recent reports suggest that Craxs RAT has been actively marketed on Chinese underground forums since its original developer sold their distribution channel in 2023. This shift has likely facilitated the emergence of variants like BIG SHARK.

Organizations should educate employees about phishing risks, implement robust endpoint protection solutions, and regularly update Android devices to patch vulnerabilities.

The emergence of BIG SHARK underscores the persistent evolution of Android-targeted malware and the urgent need for vigilance in the face of these threats.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here

Kaaviya

Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Recent Posts

GitAuto Strengthens Code Security By Automating QA At Scale

In the current software landscape, security breaches caused by untested or poorly tested code are…

16 minutes ago

Cybersecurity in Mergers and Acquisitions – CISO Focus

Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…

2 hours ago

Top Cybersecurity Trends Every CISO Must Watch in 2025

In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…

2 hours ago

Zero Trust Architecture – A CISO’s Blueprint for Modern Security

Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…

2 hours ago

Chrome 136 Released With Patch For 20-Year-Old Privacy Vulnerability

The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…

2 hours ago

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…

12 hours ago