The Rafel RAT Seeks to Target Android Devices
Cyber espionage groups and other threat actors are utilizing an open-source Android remote administration tool known as Rafel RAT. Disguised as popular applications such as Instagram, WhatsApp, and various e-commerce and antivirus apps, Rafel RAT enables these malicious actors to achieve their goals covertly.
Table of Contents
Features and Capabilities
According to a recent analysis by Check Point, Rafel RAT equips attackers with a robust toolkit for remote control and administration. This powerful tool allows for a wide array of malicious activities, ranging from data theft and device manipulation to acting as ransomware. Among its features are the ability to wipe SD cards, delete call logs, siphon notifications, and execute ransomware attacks.
Notable Campaigns and Attack Strategies
The DoNot Team, also known as APT-C-35, Brainworm, and Origami Elephant, has been identified as a user of Rafel RAT in their cyber attacks. A significant campaign in April 2024 exploited a vulnerability in Foxit PDF Reader, using military-themed PDF lures to trick users into downloading the malware. This campaign spanned several countries, targeting high-profile entities in nations such as Australia, China, Germany, India, and the United States.
Target Devices and Vulnerabilities
Research by well known sources like CheckPoint has highlighted approximately 120 malicious campaigns involving Rafel RAT. The majority of these attacks targeted Samsung devices, followed by Xiaomi, Vivo, and Huawei. A concerning 87.5% of the compromised devices were running outdated Android versions, lacking the latest security fixes.
Attack Techniques
The attack methods often involve social engineering tactics, where victims are manipulated into granting intrusive permissions to malware-laced apps. This allows the malware to harvest sensitive data such as contact information, SMS messages (including 2FA codes), location data, call logs, and lists of installed applications.
Command-and-Control Communications
Rafel RAT primarily uses HTTP(S) for its command-and-control (C2) communications, but it can also leverage Discord APIs to contact the attackers. Additionally, it comes with a PHP-based C2 panel that registered users can utilize to issue commands to compromised devices.
Case Study: Ransomware Operation
An example of Rafel RAT's effectiveness is its use in a ransomware operation by an attacker likely from Iran. The attacker sent a ransom note in Arabic via SMS, urging a victim in Pakistan to contact them on Telegram, showcasing the tool's versatility and reach.
Rafel RAT exemplifies the evolving landscape of Android malware, characterized by its open-source nature, extensive feature set, and widespread use in various illicit activities. The prevalence of Rafel RAT underscores the importance of continuous vigilance and proactive security measures to protect Android devices from malicious exploitation.








