Monday, February 17, 2025
HomeAndroidHackers Claiming that EagleSpy Android RAT 3.0 Steals 2FA Google Authenticator Code

Hackers Claiming that EagleSpy Android RAT 3.0 Steals 2FA Google Authenticator Code

Published on

SIEM as a Service

Follow Us on Google News

A malicious software known as EagleSpy Android RAT (Remote Access Trojan) 3.0 has been shared on a notorious online forum by a threat actor.

This advanced malware version is specifically designed to target mobile phones, posing significant personal and financial data risks.

EagleSpy Android RAT 3.0 represents a significant evolution in the capabilities of malware targeting Android devices.

Its alarmingly sophisticated features enable it to bypass several security layers designed to protect users’ data.

Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.:

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, that helps you to quantify risk accurately:

A recent tweet from the security intelligence provider ThreatMon reported that a threat actor shared the EagleSpy Android Remote Access Trojan (RAT) 3.0 Ultimate on a forum.

https://twitter.com/MonThreat/status/1772559133788528736

Key Features of EagleSpy Android RAT 3.0

  • Bypassing Banking Applications: The malware can circumvent security measures of banking apps, potentially allowing hackers to access users’ financial information.
  • Skipping the Black Screen: It can operate without triggering the black screen that signals another service is using an app, making its activities less detectable.
  • Bypassing Google Play Protection: EagleSpy can evade Google Play’s security checks, enabling the installation of malicious apps without detection.
  • Stealing Cookies and Login Credentials: The RAT can access and exfiltrate cookies and login details from all registered websites on the infected device, compromising users’ online accounts.
  • FUD (Fully Undetectable) Stub: It includes a feature to keep the APK (Android Package Kit) hidden from antivirus software, making it harder to detect and remove.
  • Stealing 2FA Google Authenticator Codes: Perhaps most alarmingly, it claims to be able to steal codes from Google’s two-factor authentication (2FA) app, which is widely used as an additional security measure.

EagleSpy Android RAT 3.0’s capabilities pose a significant threat to users, potentially allowing unauthorized access to sensitive personal and financial information.

The ability to bypass 2FA, a cornerstone of modern online security practices, is particularly concerning. This could lead to unauthorized account access, financial theft, and identity fraud.

The emergence of EagleSpy Android RAT 3.0 underscores the evolving threat landscape facing Android users.

By staying informed about these threats and taking proactive security measures, users can significantly reduce their risk of falling victim to such malicious software.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection

Ransomware gangs are accelerating their operations, with the average time-to-ransom (TTR), the period between...

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable...

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered,...

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection

Ransomware gangs are accelerating their operations, with the average time-to-ransom (TTR), the period between...

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable...

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered,...