• About
  • Advertise
  • Careers
  • Contact
Friday, March 31, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Cyber Crime

Researchers have spotted Triangulum, a previously known threat actor making a comeback with new Android malware that is now being sold on dark web hacking forums.

by Cyber360 News
January 13, 2021
in Cyber Crime
0
Researchers have spotted Triangulum, a previously known threat actor making a comeback with new Android malware that is now being sold on dark web hacking forums.
0
SHARES
6
VIEWS
Share on FacebookShare on Twitter

Researchers have spotted Triangulum, a previously known threat actor making a comeback with new Android malware that is now being sold on dark web hacking forums.

With malware evolving every day, we’re bound to come across new attack vectors and new types. In the latest, researchers from Checkpoint have discovered a new type of Android malware being spread on the dark web by a threat actor dubbed Triangulum.

Alleged to be a 25-year-old Indian man, he seems skilled in mathematics and a few details about his personal life are also known through his profile on dark web forums.

Latest: Pakistani Android users hit by spyware campaign with malicious apps

Delving into his malware, the very first one was in 2017, a remote administration tool for Android which could collect data from the victim’s smartphone and transmit it to a C2 server along with having the ability to destroy not only user data but the entire operating system in itself:

Triangulum’s post in 2017

Soon, this product was offered for sale in the October of 2017 but shortly afterward as the researchers point out, he disappeared with no activity on the forums. Yet, in April 2019, he came back, this time offering 4 products for sale in a span of half a year.

These 4 products being developed and made available for sale in such a short time period is what made the researcher suspicious as it is not possible for an individual alone to do so. Investigating, it was found that he was collaborating with another actor named HeXaGoN Dev with whom he had dealings in the past.

This collaboration has now led the duo to create crypto miners, keyloggers, and additional types of malware.

Moreover, they offered different payment plans for the malware they created which initially included a one-time $60 price to subscription plans being offered eventually adopting a SaaS model (pretty entrepreneurial if you ask me).

Furthermore, the way they have marketed their malware is also impressive using attractive graphics as shown below:

Malware vendor returns with yet another nasty Android malware

Ad for DarkShades RAT in 2019 and for Rogue malware in 2020

The above advertisements relate to 2 different versions of the same product with Rogue being the updated one as in 6.2. It features the capability to do a range of things including “downloading additional payloads.”

As for if all of these were self-developed, some of the features have been copied from another open-source malware named Hawkshaw. Commenting on how it evades detection on one front, the researchers state in their research that:

The Rogue malware family adopted the services of the Firebase platform to disguise its malicious intentions and masquerade as a legitimate Google service.

Rogue uses Firebase’s services as a C&C (command and control) server, which means that all of the commands that control the malware and all of the information stolen by the malware is delivered using Firebase’s infrastructure

Apart from this, attempts have also been seen by Triangulum to sell to Russians on darknet forums but this failed pretty quickly due to a lack of a reputation in that particular community and therefore users would not trust him.

See: Security of Millions At Risk Due to Unpatched Android Apps

To conclude, this is a great example of a malware developer packaging their products in an attractive way like legitimate software developers would do. It shows another type of advancement in the black hat world apart from the obvious increasing technological prowess of attackers.

Did you enjoy reading this article? Don’t forget to like our page on Facebook and follow us on Twitter! 

Cyber360 News

Cyber360 News

Next Post
mimecast-certificate-office-365.jpg

Hackers Steal Mimecast Certificate Used to Securely Connect with Microsoft 365

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In