Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Home/Threats/Arsink RAT Attacks Android: Exfiltrates Attacking Devices
Threats

Arsink RAT Attacks Android: Exfiltrates Attacking Devices

Arsink RAT, a recently identified Android malware, poses a significant threat to mobile devices globally. This cloud-native Remote Access Trojan (RAT) grants attackers complete control over...

David kimber
David kimber
February 2, 2026 2 Min Read
3 0

Arsink RAT, a recently identified Android malware, poses a significant threat to mobile devices globally. This cloud-native Remote Access Trojan (RAT) grants attackers complete control over compromised devices, enabling the stealthy exfiltration of personal information.

The malware spreads through social media platforms like Telegram, Discord, and file-sharing sites such as MediaFire, disguising itself as popular apps to trick users into installation.

Arsink operates by pretending to be legitimate applications from well-known brands including Google, YouTube, WhatsApp, Instagram, Facebook, and TikTok.

Attackers distribute fake “mod” or “pro” versions of these apps, convincing victims they are downloading enhanced features.

Once installed, the malware requests excessive permissions and begins its surveillance activities without providing any real functionality.

The threat affects users globally, with approximately 45,000 unique victim IP addresses identified across 143 countries.

Zimperium analysts identified the malware campaign after tracking its rapid expansion over several months. The research team discovered 1,216 distinct malicious APK files and 317 Firebase Realtime Database endpoints used for command-and-control operations.

Most concerning is the scale of data theft occurring silently in the background. The malware captures SMS messages including one-time passwords, call logs, contacts, device location, and even audio recordings through the microphone.

Showing samples found over the period of time (Source - Zimperium)
Showing samples found over the period of time (Source – Zimperium)

The heaviest concentrations of infections appear in Egypt with roughly 13,000 compromised devices, followed by Indonesia with 7,000 cases, and Iraq and Yemen each reporting 3,000 infections.

Brands that were impersonated in this campaign (Source - Zimperium)
Brands that were impersonated in this campaign (Source – Zimperium)

Countries like Pakistan, India, and Bangladesh also show significant victim numbers, demonstrating the widespread nature of this threat.

Social Engineering Distribution Methods

Arsink’s distribution strategy relies heavily on social engineering techniques rather than technical exploits.

The attackers use multiple cloud services for different purposes, making detection more challenging. Some variants upload stolen files to Google Drive using Google Apps Script, while others send information directly to Telegram bots controlled by the attackers.

A third variant hides a secondary malicious payload inside the initial app, which gets extracted and installed without needing internet connectivity.

The malware maintains persistence on infected devices by hiding its app icon and running a foreground service that resists termination.

This allows continuous monitoring and data collection even when users think they have closed all apps.

Remote operators can trigger various actions including toggling the flashlight, making phone calls, uploading files, and even wiping all data from external storage as a destructive measure.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Google Exposes ShinyHunters’ Expanded Threat Activity & New

Next Post

Hackers Attack MongoDB: Delete Databases, Demand Ransom Note

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us