Iranian hackers show strong interest in Android spying tools

AndroRAT and DroidJack both can read text messages and listen to calls

Iranian hackers are showing strong interest in malware that can secretly pull data from Android devices, which are popular in the Middle East.

The analysis comes from Recorded Future, a cybersecurity intelligence firm based in Somerville, Massachusetts.

One of Recorded Future's specialties is monitoring hacking forums, looking for clues and chatter that might indicate future attacks.

Over the last six months, there appears to have been high interest on Iranian hacking forums in remote access tools, or programs designed to listen to calls and collect text message and GPS data, according to a blog post.

The most-discussed tools were AndroRAT and DroidJack. AndroRAT is free and has been around for close to four years, while DroidJack appeared last year.

"With a low level of technical skill needed, open availability and strong community support on hacker forums, DroidJack and AndroRAT are likely to remain popular choices for threat actors seeking to take advantage of Middle Eastern mobile systems," Recorded Future wrote.

The fact that Iranian hackers are embracing them now shows that threat actors are adapting to go after platforms that are popular in their own countries or regions, the company wrote. The tools to do so may be easy to get.

DroidJack has its own website. It costs US$210, and its developers aren't cagey about the app's mission: "DroidJack gives you the power to establish control over your beloveds' Android devices with an easy-to-use GUI and all the features you need to monitor them."

droidjack Screenshot/DroidJack

DroidJack can provide a list of calls made by a victim's Android phone.

Tricking someone into installing such apps without their knowledge is illegal in most countries.

Symantec wrote in November 2014 that it found the names and phone numbers of people supposedly based in India who developed DroidJack.

AndroRAT has been an open-source project. Like DroidJack, it can be wrapped into a legitimate Android app's application package (APK) in order to deceive people into installing it.

"The sustained Iranian interest in AndroRAT, despite its age and declining chatter from other sources, could be due to the easy download access, including GitHub repositories, and available community support for deploying the malware," Recorded Future wrote.

Join the CSO newsletter!

Error: Please check your email address.

More about Symantec

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jeremy Kirk

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts