Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
Home/Threats/Oblivion RAT: Fake Play Store Updates Deliver Android
Threats

Oblivion RAT: Fake Play Store Updates Deliver Android

Oblivion RAT, a newly discovered Android remote access trojan, has surfaced on cybercrime networks, establishing itself as a comprehensive malware-as-a-service (MaaS) platform that transforms fake...

Marcus Rodriguez
Marcus Rodriguez
March 23, 2026 4 Min Read
0 0

Oblivion RAT, a newly discovered Android remote access trojan, has surfaced on cybercrime networks, establishing itself as a comprehensive malware-as-a-service (MaaS) platform that transforms fake Google Play Store update pages into a full-scale spyware operation.

First reported by Certo Software, the threat has drawn attention because of how polished and ready-to-deploy the operation is, covering everything from dropper delivery to real-time device control.

Oblivion RAT is sold on underground forums at $300 per month, with longer tiers going up to $2,200 for a lifetime license.

The package includes a web-based APK builder for the implant, a separate dropper builder that generates fake Google Play update pages, and a command-and-control (C2) panel for live device management.

Attackers distribute the dropper through messaging apps and dating platforms, tricking victims into believing they are installing a legitimate Google Play update.

iVerify analysts identified the malware and reverse-engineered its full infection chain after obtaining samples of both the dropper and the RAT implant, gaining access to the builder and C2 panel.

Researchers noted the platform is well-structured, with built-in language presets supporting English and Russian, confirming the operation targets victims across multiple regions.

The dropper defaults to the package pattern com.darkpurecore*, with com.oblivion.dropper.MainActivity as the launcher activity across all observed samples.

The infection follows a two-stage model. The dropper APK carries a compressed RAT implant (payload.apk.xz) and three self-contained HTML pages that simulate a real Google Play update flow. 

Fake download completion with security scan (Source - iVerify)
Fake download completion with security scan (Source – iVerify)

The first page displays a progress bar and a phony security scan showing messages such as “No malicious code” and “Verified developer.”

The second page presents a fake Play Store listing under the developer name “LLC Google,” with a 4.5-star rating and an UPDATE button that triggers the sideloading process.

Fake Play Store listing page (Source - iVerify)
Fake Play Store listing page (Source – iVerify)

The third page walks the victim through enabling app installation from unknown sources, framing it as a routine security step.

Once the victim follows these steps, the second-stage implant quietly takes over the device and runs in the background with no visible interface.

The impact is severe — the attacker gains near-total control over the compromised device, with access to SMS messages, keystrokes, financial app data, and live screen sessions.

AccessibilityService Hijacking

The most dangerous part of Oblivion’s attack is how it abuses Android’s AccessibilityService to silently seize full device control.

After the second-stage implant is installed, the malware requests AccessibilityService access through a pixel-perfect replica of Android’s Accessibility settings screen. 

Sideloading enablement walkthrough (Source - iVerify)
Sideloading enablement walkthrough (Source – iVerify)

Every element on this screen — the title, section headers, and the Enable button — is operator-controlled through the APK Builder. 

Once the victim taps Enable, the implant takes over the device’s interface entirely. It navigates Android’s Settings to silently auto-grant itself every dangerous permission, including SMS access, storage, notification listener, and device admin rights, without showing the victim a single prompt.

A backend toggle called hide_permission_process makes this entirely invisible by intercepting and auto-dismissing system dialogs before they appear on screen.

With full control, the operator can open real-time VNC sessions with complete touch input, log every keystroke tagged by app and timestamp, and intercept all SMS messages — including OTP codes and 2FA tokens — before they reach the victim.

Real-time VNC session interface (Source - iVerify)
Real-time VNC session interface (Source – iVerify)

A built-in “Wealth Assessment” feature sorts the victim’s installed apps into categories like Banks, Crypto, and Government services, giving the attacker a quick view of the most valuable accounts to target.

C2 panel with Wealth Assessment (Source - iVerify)
C2 panel with Wealth Assessment (Source – iVerify)

Android users should only download apps from the official Google Play Store and immediately turn down any request to grant accessibility permissions to unknown apps.

Any prompt asking to enable sideloading outside the Play Store should be treated as a red flag. Organizations should enforce device management policies that restrict installations from unknown sources and monitor for suspicious AccessibilityService activity.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Windows 11 Emergency Update Fixes ‘No Internet’ Sign-In

Next Post

Libyan Oil Refinery Hit by Long-Running AsyncRAT Esp

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us