Skip to main content
Mallory

Commercial Android RATs Abuse Accessibility Services for Full Device Takeover

remote-access-implantcybercrime-service-ecosystemphishing-campaign-intelligencecredential-access-methoddefense-evasion-method
Updated March 21, 2026 at 02:18 PM2 sources
Share:
Commercial Android RATs Abuse Accessibility Services for Full Device Takeover

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Two newly reported Android Remote Access Trojans (RATs)SURXRAT and Oblivion—highlight a continued shift toward commercialized, subscription-based mobile malware that enables non-expert criminals to gain full control of victim devices and exfiltrate data. Both threats are positioned as scalable offerings (i.e., Malware-as-a-Service) with structured sales models and distribution support, lowering the barrier to entry for surveillance, credential theft, and account takeover.

The reported infection chains rely heavily on social engineering to trick users into installing or activating malicious components, then escalating control by abusing Android Accessibility Services to bypass normal interaction and security boundaries. SURXRAT is described as modular and stealth-focused, distributed primarily via Telegram channels with tiered licensing/reseller options, and capable of broad data access (e.g., SMS, contacts, location, storage) once high-risk permissions are granted. Oblivion is marketed at roughly $300/month (with longer-term pricing tiers) and is delivered via fake Google Play update prompts; researchers reported capabilities including SMS theft for banking codes, keylogging, remote unlocking after reboot, and covert live screen viewing while a decoy “system updating” animation distracts the victim, with infrastructure reportedly able to manage 1,000+ concurrent victims (including via Tor).

Timeline

  1. Feb 25, 2026

    Cyble reveals SURXRAT's cloud C2 and surveillance capabilities

    The SURXRAT analysis described a social-engineering-based installation flow in which victims are tricked into installing a seemingly legitimate app that then abuses Accessibility Services and other risky permissions. Cyble said the malware uses Firebase Realtime Database for command-and-control and supports data theft, camera and audio surveillance, real-time command execution, and a ransomware-style screen locker.

  2. Feb 25, 2026

    Cyble links SURXRAT to ArsinkRAT and exposes MaaS operation

    Cyble reported that the Android RAT SURXRAT is being sold through Telegram as a malware-as-a-service offering with tiered licensing and reseller plans. The researchers linked it to the older ArsinkRAT family, saying the developers likely repurposed and expanded earlier source code.

  3. Feb 25, 2026

    Researchers detail Oblivion's fake-update infection and device takeover features

    Researchers said Oblivion commonly infects victims through fake Google Play update prompts, abuses Android Accessibility Services to silently gain permissions, and can steal SMS messages, log keystrokes, and remotely control devices while displaying a fake system update screen. They also reported backend infrastructure designed to support more than 1,000 concurrent victims and operation over Tor for anonymity.

  4. Feb 25, 2026

    Certo reports commercial Android RAT 'Oblivion' sold by subscription

    Certo disclosed a new Android remote access trojan called Oblivion that is marketed on the public web with subscription pricing starting around $300 per month and a higher-priced lifetime option. The report said the malware lowers the barrier for stalkers and cybercriminals by making phone compromise easy to operate at scale.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Telegram-Marketed Mobile RATs Sold as MaaS Target Android (and Claimed iOS) via Smishing and Surveillance Features

Telegram-Marketed Mobile RATs Sold as MaaS Target Android (and Claimed iOS) via Smishing and Surveillance Features

Researchers reported two **Telegram-marketed malware-as-a-service (MaaS)** offerings focused on mobile device compromise and surveillance. *ZeroDayRAT* is advertised as a subscription spyware platform claiming full monitoring of **Android and iOS** devices, with infections driven by **smishing** and other social-engineering lures that push victims to malicious links disguised as legitimate apps/updates; delivery chains reportedly use multi-stage redirects, URL shorteners, and in some cases trusted hosting such as *GitHub Pages* to evade reputation-based filtering. Once installed, the operator-facing web panel is advertised to provide extensive monitoring, including device profiling, app-usage timelines, GPS tracking, and remote activation of camera/microphone, plus screen recording and keystroke logging—capabilities consistent with credential theft and broad user surveillance. Separately, Cyble detailed ongoing development of *SURXRAT* (marketed as **SURXRAT V5**) as an Android RAT sold through a structured reseller/partner licensing model that enables affiliates to generate customized builds while the operator retains centralized control. The malware is described as a full-featured surveillance and device-control toolkit that abuses **Android Accessibility** permissions for persistent control and uses **Firebase-backed C2**; code similarities indicate lineage from **ArsinkRAT**. Recent samples were observed conditionally downloading a **large LLM module from Hugging Face**, which researchers assess as experimentation that could enable AI-assisted functionality, deliberate device performance impact, or new monetization approaches alongside established behaviors such as data exfiltration, remote command execution, and ransomware-style device locking.

1 months ago
Multiple Remote Access Trojan Campaigns Target Windows and Android via Phishing, App Stores, and Social Platforms

Multiple Remote Access Trojan Campaigns Target Windows and Android via Phishing, App Stores, and Social Platforms

Threat researchers reported several unrelated **RAT-focused malware campaigns** using different delivery channels and evasion techniques. **DEAD#VAX** was described as a Windows phishing operation that delivers **AsyncRAT** via purchase-order lures, abusing **IPFS-hosted VHD** files disguised as PDFs; the mounted VHD drops a multi-stage chain using **WSF**, heavily obfuscated batch scripts, and PowerShell loaders to decrypt and execute x64 shellcode **in memory** by injecting into trusted Windows processes, minimizing on-disk artifacts. Separately, analysis of **Pulsar RAT** activity described persistence via the per-user Run key (`HKCU\Software\Microsoft\Windows\CurrentVersion\Run`), an obfuscated batch dropper in *AppData*, PowerShell-based staging, and **Donut-generated shellcode** injection into processes such as `explorer.exe`, with anti-analysis features and data theft (credentials, wallets, tokens) exfiltrated via **Discord webhooks**. On Android, two distinct campaigns were highlighted. **Anatsa** banking malware was found distributed through **Google Play** in a trojanized “document reader” app that exceeded **50,000 downloads** before detection; the initial app acts as a loader that retrieves the full banking trojan and supports credential theft and C2-driven actions, with reporting attributing discovery and tracking to **Zscaler ThreatLabz**. **Arsink RAT** was reported spreading primarily via **Telegram/Discord** and file-sharing sites (e.g., MediaFire) through fake “mod/pro” apps impersonating major brands; research attributed to **Zimperium** cited **~45,000** victim IPs across **143 countries**, **1,216** malicious APKs, and **317** Firebase Realtime Database C2 endpoints, with capabilities including SMS/OTP theft, call log and contact harvesting, location tracking, and microphone audio capture.

1 months ago
Android Mobile Malware Campaigns Targeting SMS/OTP and Identity Data

Android Mobile Malware Campaigns Targeting SMS/OTP and Identity Data

Multiple reports highlight evolving **Android** threats that abuse SMS/telephony access and advanced evasion to enable fraud, surveillance, and account takeover. CloudSEK described a shift from repackaged apps to **runtime manipulation** using the *LSPosed* framework, where a malicious module (e.g., **Digital Lutera**) hooks `SmsManager` and `TelephonyManager` to undermine India’s **UPI SIM-binding** controls. The technique can intercept registration tokens and 2FA, spoof device identity/phone number, and exfiltrate data to **Telegram**; it also uses **Socket.IO** for real-time C2 and can remotely inject fabricated SMS entries into the device’s “Sent” database to make bank backends believe a SIM is present on a different device, enabling scalable payment fraud and account takeover. Separately, Acronis TRU (reported by Hackread) identified a **fake Red Alert** rocket-warning app distributed via SMS lures impersonating Israel’s Home Front Command; the trojanized app displays legitimate alerts to reduce suspicion while requesting extensive permissions to steal **GPS location**, **SMS/OTP**, contacts, installed-app inventory, and on-device account details, then exfiltrates data to a remote server, including via **certificate spoofing** and UI tricks to appear Play Store-installed. Zimperium reported a new Android RAT, **SurxRAT**, that can download and run **LLM modules** from third-party repositories to automate phishing and social engineering and to interact with apps/UI for credential theft and data exfiltration, reinforcing the need for behavior-based mobile detection, tighter app controls, and stronger integrity enforcement (e.g., *Play Integrity API* with `MEETS_STRONG_INTEGRITY`) where applicable.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.