<\/a><\/figure>\n\n\n\nCommunication takes place over HTTP(S) protocols, starting with the initial client-server interaction. The infected device initially transmits device information, including identifiers, characteristics, locale, country, model specifics, and operator details. Subsequently, a request is sent to the C&C server for commands to execute on the device.<\/p>\n\n\n\n
Check Point Research identified a ransomware campaign carried out by an alleged Iranian, the attackers <\/gwmw><\/gwmw>sent a ransom note written in Arabic through an SMS that instructed victims in Pakistan to contact them on Telegram.<\/p>\n\n\n\n
“Rafel RAT is a potent example of the evolving landscape of Android malware, characterized by its open-source nature, extensive feature set, and widespread utilization across various illicit activities. The prevalence of Rafel RAT highlights the need for continual vigilance and proactive security measures to safeguard Android devices against malicious exploitation.” concludes the report. “As cyber criminals continue to leverage techniques and tools such as Rafel RAT to compromise user privacy, steal sensitive data, and perpetrate financial fraud, a multi-layered approach to cybersecurity is essential.”<\/em><\/gwmw><\/gwmw><\/p>\n\n\n\n