Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

GhostBat RAT Android Malware With Fake RTO Apps Steals Targeting Indian Users to Steal Banking Data

Posted on October 15, 2025October 16, 2025 By CWS

The GhostBat RAT marketing campaign has emerged as a classy risk focusing on Indian Android customers via counterfeit Regional Transport Workplace (RTO) functions.

First noticed in mid-2025, these malicious APKs masquerade because the official “mParivahan” app, exploiting person belief in authorities providers.

Distribution happens primarily by way of smishing—WhatsApp messages and SMS containing shortened URLs redirecting victims to GitHub-hosted payloads—or via compromised web sites.

Malicious APKs circulating on WhatsApp (Supply – Cyble)

As soon as put in, the malware prompts victims to grant SMS-related permissions below the guise of important updates, setting the stage for banking information exfiltration.

Upon set up, the app shows a phishing interface remarkably much like the real mParivahan format.

The sufferer is prompted to enter automobile and cell particulars, adopted by a pretend UPI cost request of ₹1 to “confirm possession.”

In the meantime, SMS messages containing banking-related key phrases are harvested and exfiltrated to attacker-controlled servers.

Incoming one-time passwords (OTPs) will be forwarded on to adversaries, facilitating unauthorized transactions.

Cyble analysts famous the incorporation of a Telegram bot, GhostBatRatbot, which registers contaminated gadgets and serves as a command channel for stolen information.

Beneath the social engineering facade, GhostBat RAT depends on a number of anti-analysis and obfuscation techniques.

The preliminary dropper performs anti-emulation checks by interrogating Construct.CPU_ABI and Construct.MANUFACTURER values, terminating execution if an emulator is detected.

Pattern code from this stage illustrates the heavy string obfuscation and emulator avoidance logic:

public static boolean isRealDevice(String abi) {
if (abi.equals(“x86”) || abi.equals(“x86_64”)) {
return false;
}
String producer = Construct.MANUFACTURER.toLowerCase(Locale.ROOT);
if (producer.comprises(“generic”) || producer.comprises(“emulator”)) {
return false;
}
return true;
}

Malware applied anti-emulation methods (Supply – Cyble)

A multi-stage dropper then decrypts embedded payloads utilizing XOR operations and dynamic DexClassLoader loading, guaranteeing detection evasion.

Native libraries (.so) additional complicate evaluation by reconstructing API calls in reminiscence by way of JNI. These layers collectively hinder reverse engineering and antivirus detection.

GhostBat RAT’s An infection Mechanism

Right here the whole an infection mechanism leverages smishing URLs disguised as RTO providers. Upon clicking a shortened hyperlink, customers obtain an APK hosted on GitHub or related platforms.

The installer requests SMS-read and SMS-send permissions, which victims usually grant below the pretext of service performance.

As soon as permissions are in place, the dropper decrypts its second-stage payload:-

InputStream in = context.getAssets().open(“encrypted_payload”);
byte[] information = new byte[in.available()];
in.learn(information);
in.shut();
byte[] key = MessageDigest.getInstance(“SHA-1”)
.digest(“encrypted_payload”.getBytes(StandardCharsets.UTF_8));
for (int i = 0; i

This decrypted element homes the credential stealer and cryptominer modules, that are loaded dynamically.

The ultimate payload mimics a real app replace web page, tricking customers into putting in the malicious mParivahan app.

By chaining these levels, GhostBat RAT achieves stealthy set up and sturdy persistence, making it a major threat to Indian cell banking customers.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Android, Apps, Banking, Data, Fake, GhostBat, Indian, Malware, RAT, RTO, Steal, Steals, Targeting, Users

Post navigation

Previous Post: F5 Blames Nation-State Hackers for Theft of Source Code and Vulnerability Data
Next Post: F5 Breached – Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data

Related Posts

Critical Vulnerability in Azure Bastion Let Attackers Bypass Authentication and Escalate privileges Cyber Security News
New Malware Using Azure Functions For Hosting Command And Control Infrastructure Cyber Security News
Top 10 Best Brand Protection Solutions For Enterprises in 2025 Cyber Security News
MongoDB Server Pre-Authentication Vulnerability Let Attackers Trigger DoS Condition Cyber Security News
CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS Cyber Security News
Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide
  • QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed
  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
  • Resemble AI Raises $13 Million for AI Threat Detection
  • Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide
  • QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed
  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
  • Resemble AI Raises $13 Million for AI Threat Detection
  • Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark