Cyber Security News

New Android RAT Dubbed “AndroRAT” Attacking to Steal Pattern, PIN & Passcodes

A newly identified variant of the Android Remote Access Tool (RAT), AndroRAT, has emerged as a critical cybersecurity threat, leveraging sophisticated techniques to steal device unlock patterns, PINs, and passcodes. 

The malware, first documented in 2012 as an open-source university project, has evolved into a weaponized tool capable of bypassing Android security mechanisms up to version 15. 

Cybersecurity analysts have observed its integration with exploit frameworks targeting vulnerabilities like CVE-2015-1805, a Linux kernel flaw patched in 2016 but still present on millions of un-updated devices.

The latest AndroRAT iteration employs a multi-stage infection process beginning with dropper apps distributed through third-party stores and phishing campaigns.

AndroRAT’s New Tactics

One observed payload masquerades as “TrashCleaner,” a utility app that triggers the installation of a second-stage component disguised as a calculator app. 

Upon execution, the malware abuses system_server permissions to inject exploits into the com.android.settings process, enabling silent privilege escalation.

Key technical components include:

Gesture.key Hash Extraction: AndroRAT targets /data/system/gesture.key and locksettings.db3, files storing SHA-1 hashes of unlock patterns. 

Through adb pull commands executed post-exploitation, the malware extracts these hashes for offline cracking using tools like LockKnife, which employs dictionary attacks via customizable wordlists (rockyou.txt) and brute-force algorithms for 4–8-digit PINs.

Screen Interaction Bypass: The RAT utilizes input tap and input swipe shell commands to simulate user interactions, enabling auto-unlock functionality even on devices with active pattern/PIN authentication.

Memory Injection: By exploiting ptrace() vulnerabilities in Android’s Bionic libc, the malware injects payloads into legitimate processes like com.google.android.gms, evading detection by Google Play Protect.

According to post shared on X, the AndroRAT now include features including: 

  • Keylogger Module: Intercepts get event streams from /dev/input/event* to capture keystrokes, even on encrypted messaging apps.
  • Hide Notifications & Mute Volume: Uses NotificationListenerService to block security alerts from antivirus apps.
  • Dynamic DNS Fallback: Implements a Domain Generation Algorithm (DGA) using seed values derived from device IMEI to maintain C2 connectivity if primary servers are blocked.

Analysts have documented the malware’s ability to exfiltrate biometric data from devices with fingerprint sensors by intercepting BiometricPrompt API transactions.

Mitigation Strategies

Enterprises are advised to:

  • Block traffic to IP ranges 185.130.104.[0-255] and 194.87.92.[0-255], associated with AndroRAT’s C2 servers.
  • Deploy SELinux policies enforcing neverallow rules for untrusted app interactions with gesture.key.
  • Monitor for anomalous SQLiteDatabase queries targeting locksettings.db, a signature of credential dumping activity.

AndroRAT’s evolution reflects a broader trend of academic tools being weaponized. The original 2012 codebase included innocuous features like GPS tracking but lacked rootkit capabilities. 

The 2025 variant incorporates code fragments from Dendroid and OmniRAT, suggesting collaboration between Eastern European and Southeast Asian threat actors.

As Android 15 introduces hardened Gatekeeper protections, attackers have shifted focus to social engineering, exploiting trusted apps like “TrashCleaner” to bypass technical safeguards. 

With over 12,000 infections logged since January 2025, this campaign underscores the critical need for firmware-level security updates across all Android OEMs.

Cybersecurity professionals are urged to analyze memory dumps using Volatility plugins targeting com.android.server.locksettings and to scrutinize APKs requesting REQUEST_COMPANION_START_FOREGROUND_SERVICES_FROM_BACKGROUND permissions—an obvious sign of AndroRAT infection.

Kaaviya

Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Recent Posts

Kali Linux Warns that Update Process is Going to Fail for All Users

Kali Linux users worldwide are facing an imminent disruption as the security-focused distribution has announced…

2 hours ago

Threat Actors Leverage Access to Valid Accounts via Phishing Attack

In a significant shift observed during the first quarter of 2025, cybersecurity experts have documented…

11 hours ago

Threat Actors Increasingly Utilize Ransomware as a Service Boosted by EDR Killers

The cybersecurity landscape is witnessing a significant shift as threat actors increasingly leverage Ransomware as…

11 hours ago

Threat Actors Weaponize Language Software to Windows-Based Remote Surveillance Malware

Senior members of the World Uyghur Congress (WUC) living in exile became targets of a…

11 hours ago

RansomHub Ransomware Deploying Malware to Compromise Corporate Networks

A new Ransomware-as-a-Service (RaaS) group called RansomHub emerged in the cybercriminal ecosystem, specializing in targeting…

12 hours ago

SAP NetWeaver 0-Day Vulnerability Exploited in the Wild to Deploy Webshells

SAP released an emergency out-of-band patch addressing CVE-2025-31324, a critical zero-day vulnerability in SAP NetWeaver…

13 hours ago