

Then, the malicious actors could make notes on the victim, download any materials that are stolen, and collect intelligence for other infamous activities.įrom an operational viewpoint, RatMilad performs various requests to the command-and-control (C&C) server based on certain jobID and requestType, and then the app dwells and lies in wait indefinitely for tasks to execute on the device, researchers said. Just like other mobile spyware, the data stolen from these devices could be used to access private corporate systems, blackmail a victim, and more. Phone info – Model, Brand, buildID, android version, Manufacturer.List of the installed applications, along with their permissions.Sim Information – MobileNumber, Country, IMEI, Simstate.Once implemented, the novel RatMilad spyware accesses as an advanced Remote Access Trojan (RAT) with spyware capabilities that receives and executes commands to collect and exfiltrate a wide range of data from the infected mobile endpoint and perform several malicious actions, such as:
