BitterAPT Revisited: the Untold Evolution of an Android Espionage Tool

Oana ASOLTANEI

June 18, 2020

Promo Protect all your devices, without slowing them down.
Free 30-day trial
BitterAPT Revisited: the Untold Evolution of an Android Espionage Tool

In 2016, a sophisticated malware campaign targeting Pakistani nationals made headlines. Dubbed Bitter, the Advanced Persistent Threat group (also known as APT-C-08) has been active both in desktop and mobile malware campaigns for quite a long time, as their activity seems to date back to 2014.

The Bitter threat group initially started using RAT tools in their campaigns, as the first Bitter versions for Android (released in 2014) were based on the AndroRAT framework. Over time, they switched to a custom version that has been known as BitterRAT ever since.

This paper is a technical account of the developments related to Bitter, its evolution and how, steadily and surely, threat actors are raising their game and poking holes in Google Play to use the platform as a distribution channel.

Download the PDF file below to learn more about BitterRAT, its evolution, as well as about the new distribution tactics via Google Play.

Download the whitepaper

tags


Author


Oana ASOLTANEI

Oana Asoltanei is a Security Researcher at Bitdefender. She focuses her research on Android malware and mobile security in general.

View all posts

You might also like

Bookmarks


loader