BRATA Malware Obtains Advanced Capabilities to Target Android Devices

  • By Steven
  • Published: Jun 23, 2022
  • Last Updated: Jun 24, 2022

The cybercriminals responsible for BRATA malware have enhanced their digital Frankenstein with a slew of additional features. The capabilities were implemented in Android mobile malware to make online aggressions against financial apps that much more covert and effective.

What Does BRATA Stand For?

BRATA is short for Brazilian Remote Access Tool Android. BRATA was initially identified in the wild in Brazil toward the end of 2018 and then reappeared in Europe last spring. BRATA originally operated in the form of antivirus software along with other tools used to enhance productivity, fooling targets into downloading them.

At this point, BRATA falls into the category of an APT, short for Advanced Persistent Threat

This term refers to digital attacks when criminals establish a permanent presence on the network to take highly sensitive and valuable information. The malware is advanced to the point that its altered attack pattern that escalated to new heights in the spring of 2022 designed the malware to attack certain financial institutions at specific moments in time, pivoting to a new financial institution after the target began incorporating defenses.

What Other Changes Were Made to BRATA?

BRATA’s rogue apps also include features that empower it to replicate the bank’s login page to obtain credentials, text messages, and sideload payloads of the second-stage variety. 

The information is plucked from a remote server to record events on the device that has been infiltrated.

Digital security specialists are adamant that a full account takeover attack could occur with a combination of a phishing page and obtaining targets’ text messages, making the threat more severe.

Is the Attack Zeroing in on Anyone in Particular?

Indeed, the app that steals text messages is allegedly zeroing in on targets in the United Kingdom, Spain, Italy, and possibly several other countries. The aim of the attack is to obtain and exfiltrate incoming text messages tied to the one-time passcodes transmitted by financial institutions.

Digital security researchers state the initial malware campaigns were transmitted by way of phony antivirus software and additional methods such as apps. The malware has even changed as time has progressed to perform an APT-style offensive against a customer of a financial institution based in Italy.

How Long Does the BRATA Malware Attack Typically Last?

The data reveals that in most cases, the focus is on transmitting harmful applications that zero in on banks for an undefined period of time. In general, the average BRATA attack typically lasts around a couple of months though there is no set timetable for the duration of this malware attack. 

Crunch the numbers, and you’ll find they reveal a two-month trend, showing the focus is on transmitting harmful applications to certain financial institutions for two months, then progressing to the next target.

Is There Anything Businesses and Everyday People can do to Combat the Threat?

If your computers and network are not protected by antivirus software and other digital safeguards, now is the time to add those essential forms of protection. If you have not updated your digital defenses in recent months, perform an upgrade, and your business or home computer will stand a much better chance of withstanding a digital attack.

About the Author
IDStrong Logo

Related Articles

46,000 Veterans and 13 Community Care Providers Affected by a VA Data Breach

The Incident Early last week, the Department of Veteran Affairs (VA) was breached by an unknown c ... Read More

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Latest Articles

What You Need to Know about the Navia Benefit Solutions Data Breach

What You Need to Know about the Navia Benefit Solutions Data Breach

Navia Benefit Solutions, Inc. is a consumer-focused benefits administrator headquartered in Renton, Washington. Founded in 1989, the company provides comprehensive employee benefits administration services to more than 10,000 employers across the United States.

What You Need to Know about the QualDerm Partners Data Breach

What You Need to Know about the QualDerm Partners Data Breach

QualDerm Partners, LLC is a healthcare management services provider headquartered in Brentwood, Tennessee. The company offers comprehensive administrative, clinical, and operational support to dermatology practices nationwide.

What You Need to Know about the Healthcare Interactive Data Breach

What You Need to Know about the Healthcare Interactive Data Breach

Healthcare Interactive, Inc. , also known as HCIactive, is an Ellicott City, Maryland-based provider of AI-powered software solutions for insurance enrollment and benefits administration.

What You Need to Know about the Stryker Cyberattack

What You Need to Know about the Stryker Cyberattack

Stryker Corporation is a Fortune 500 medical technology company headquartered in Kalamazoo, Michigan. Founded in 1941, Stryker manufactures surgical equipment, orthopedic implants, neurotechnology, hospital beds, and robotic surgery systems.

What You Need to Know about the LexisNexis Data Breach

What You Need to Know about the LexisNexis Data Breach

LexisNexis Legal & Professional is a global provider of legal, regulatory, and business information used by lawyers, corporations, governments, and academic institutions.

What You Need to Know about the Ericsson Data Breach

What You Need to Know about the Ericsson Data Breach

Ericsson Inc. is the U.S. subsidiary of Telefonaktiebolaget LM Ericsson, a Swedish multinational telecommunications company founded in 1876.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close