The Android malware tracked as BRATA has been updated with new features that grants it the ability to track device locations and even perform a factory reset in an apparent bid to cover up fraudulent wire transfers.
The latest variants, detected late last year, are said to be distributed through a downloader to avoid being detected by security software, Italian cybersecurity firm Cleafy said in a technical write-up. Targets include banks and financial institutions in the U.K., Poland, Italy, and Latin America.
“What makes Android RAT so interesting for attackers is its capability to operate directly on the victim devices instead of using a new device,” Cleafy researchers noted in December 2021. “By doing so, Threat Actors (TAs) can drastically reduce the possibility of being flagged “as suspicious”, since the device’s fingerprinting is already known to the bank.”