Tag: pakistani hackers

  • Pakistani hackers are targeting Indian Android users through these apps and tools!

    A cyber security firm has detected a group of hackers named “Transparent Tribe” that have used fake apps impersonating YouTube to spread a mobile remote access trojan (RAT) named CapraRAT. This group of hackers is said to be linked to Pakistan. It is said that this group especially targets those Indian users who are active in human rights related issues in Kashmir and Pakistan. According to the report of cyber security firm Sentinelone, CapraRAT was specially developed for monitoring Is used. Transparent Tribe used a remote access trojan called CapraRAT to target Android users and embedded it in three apps that appear to be similar to YouTube. CapraRAT is a very aggressive tool, which gives attackers the opportunity to gain remote access to infected Android devices and through this the data of those devices is also at risk. This is the reason why this hacking group has attacked both India and Pakistan many times in the past. Has been in the news for targeting military and diplomatic personnel in the countries. CapraRAT is basically an Android framework, which hides RAT features within another app. This means that these dangerous apps will not be found on the Google Play Store. The report further suggests that Transparent Tribe hackers spread these Android apps through their websites and use social engineering techniques to trick users into installing them. These are fake Apk files, which users mistakenly install as original apps. The most recent batch of Android package files identified by SentinelOne are related to YouTube. These apps pretend to be YouTube apps. The root names of three of these apps are “com.Base.media.service”, “com.moves.media.tubes” and “com.videos.watchs.share”. Hackers use these tricks to gain access to an Android device and According to the report, the device was able to gain access to the device’s microphone, front and rear cameras, capture SMS and MMS content, access call logs, capture screens, override system settings such as GPS and network, and delete files on the phone’s file system. Perform tasks like modifying.