Automatically translated.View original post

New malware SURXRAT helps hackers log in

The new malware, SURXRAT, allows hackers to fully log in to Android.

The type of malware that can be called coming up today will not be able to escape the remote access trojan type of malware, which has a wide range of systems, and now Android systems have fallen victim to this type of malware again.

According to a report by the website, Cyberpress has mentioned the detection of a new RAT type of malware that focuses on the implementation of the Android operating system. This malware, named SURXRAT, is distributed as malware for rental (MaaS or Malware-as-a-Service) on the famous chat platform Telegram under the name "SURXRAT V5" (making it predicted that the detected one is not the first, but has already been developed to the fifth generation). The rental will be in a monthly subscription form, which the sales system will allow the reseller to distribute the version. Custom can also be adapted to customers. According to a review of the Telegram channel that distributed the malware, there were hackers from Indonesia behind it.

The ability of this malware can be called the ability to spy on the victim and take control of the victim's machine. After installation, the malware gives the malware hackers the right to take over the victim's system. The capabilities of this malware are as follows:

Data Collection and Exfiltration is the ability to access sensitive data on the machine, such as call logs, short messages (SMS or Short Message Service), Location, etc. These data are sent to a C2 or Command and Control server running on a Firebase basis with the ability to smooth (Blending) malware data to data communicating with cloud services.

Remote Device Control The malware allows hackers to gain full control through commands such as:

Access is used for data access on Clipboard.

Lock to operate the screen lock system.

For Data Wipe

Wal used to change the background image (Wallpaper)

Brow is used to search the browser history.

The ability to form is similar to Ransomware-like malware by relying on the ability to log screens and change background images, allowing hackers to lock screens and turn background images into messages threatening victims for extortion.

Artificial Intelligence by malware can download AI models from digital archives such as Hugging Face to help with malware and hackers.

Technically, after the malware is installed on the victim's machine, the malware deceives the victim's access to the system. From the requested permissions, the malware and active hackers can access the data storage, contacts, SMS messages and locations.

After the malware is granted, the malware will contact the C2 server and immediately start smuggling the stolen data from the victim's machine back to the server. In addition, the malware will register itself as a common application to guarantee persistence on the system (Persistence) and access the Disabled Assistance Mode or Accessibility Mode to gain complete control of the machine without the victim having to interact with the malware.

# Trending # Lemon 8 Howtoo # lemon 8 diary # Malware # freedomhack

3/18 Edited to

Related posts

It's no secret that Karol G just slayed the #Grammys #Glambot . #AwardsSeason
user6854050772614

user6854050772614

11 likes

Developing a career in cybersecurity
Hey All! 👋 Want to stay safe online and protect your data? Cybersecurity knowledge is essential. It helps you secure your personal information and understand how to safeguard your digital footprint. Let’s dive into why it’s crucial! 💻🔒 Why Cybersecurity Matters Cybersecurity is about protecting
Meghana

Meghana

551 likes

3 cybersecurity jobs that pay well
1. Security Analyst - What They Do: Monitor networks for vulnerabilities, investigate breaches, and implement security measures. - How to Start: - Obtain certifications like CompTIA Security+ or CySA+. - Gain experience with tools like SIEM (e.g., Splunk). - Start in an I
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

633 likes

Check out this website that helps you when you’re feeling uninspired! I walk you thru the process of downloading the svg file to taking it to cricut design space! Happy crafting. #designinspo #creativeart #cricutprojects #svgfiles #CricutTips
VlunaWorks

VlunaWorks

46 likes

ERROR ERROR ERROR ERROR ERROR
🔺️!!!Flashy!!!🔺️ Um guys... Something is definitely wrong with my tablet 😬😨 #rewritesonic #malware #sonicexe #sonicthehedgehog #sonicfanart
EmK & Fidgi

EmK & Fidgi

2 likes

SOS!!! Wha do you do if you click a phishing email link… two times?!? So far I have: 1, added two factor sign on 2, changed my passwords 3, stress cried and spiraled But for real. What do you do… how do I know if there is now malware (? Is that what it’s called ?) living on my computer?!?
Alexandra Wildeson

Alexandra Wildeson

2 likes

A hand holds a pink iPhone with text 'Tech 101 For Beginners' and 'Tips to help Non-Tech Savvy Users,' accompanied by laptop and phone app icons, against a brick background.
A pink iPhone in its box, illustrating the tip to 'Keep Your Devices Updated' with text explaining why updates help and advising to enable automatic updates.
An iPhone screen displaying app icons and display settings, accompanying the tip to 'Use Strong, Unique Passwords' with reasons why and advice on using combinations and password managers.
Tech Hacks For Beginners 📲💻😬
I have some great tips for non-tech savvy tech users. I know these tips will help you learn your tech more quickly and effectively. 1. Keep Your Devices Updated Why It Helps: Updates often contain security patches and improvements that help your device run smoothly. Tip: Enable automatic updat
Joy 📚

Joy 📚

282 likes

#batman is not the world’s greatest detective in fact he’s like the latest detective to find the guild. The world’s greatest detective is #detectivechimp #dccomics
Dan!

Dan!

3 likes

The Podcast Invite Scheme! Always remember - it’s not your fault ♥️ this happens to so many people. Most importantly: STAY SUSPICIOUS OF EVERYTHING 🥰💕 #podcastinvite #podcast #creator #storytime #scheme
Chloe

Chloe

71 likes

A person with long dark hair and a straw hat walks through a sunny public square. Overlay text reads "CYBERSECURITY CAREER Tips to get started," introducing advice for a career in cybersecurity.
A person in a white dress walks on a path next to green bushes. Overlay text advises to "Build a Strong Technical Foundation" by learning networking basics, operating systems, and scripting languages.
People walk across a street with benches and trees in the background. Overlay text suggests to "Get Hands-On Experience" through CTF competitions, cybersecurity challenges, and setting up a home lab.
Tips for pursuing a career in cybersecurity
1. Build a Strong Technical Foundation A solid understanding of systems, networks, and programming is essential for identifying and mitigating security threats. • Learn networking basics (e.g., TCP/IP, firewalls, VPNs). • Gain familiarity with operating systems (Windows, Linux)
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

132 likes

You need TikTok ?
Here is how you can download TikTok if you need help with and apple phone just ask me I can help with Apple phone you need to change your region on the Apple Pay store
Ali

Ali

10 likes

Free Games! ✅
Free Games! ✅ Yes it’s trusted by many people and it’s the best in the industry! And no malware or virus! Follow for more value! 😉 #freegames #pcgamers #steamgames #gamer #tech
Tech With Unes

Tech With Unes

7 likes

SATURDAY | 2 MAY 2026 | Cybersecurity Report
The digital frontlines just got a lot more dangerous. Today on Cyber F.M., host Arias Thomas breaks down the industrialization of cybercrime and the collapse of the software supply chain. If you think your "secure" tools are safe, think again. Inside Today’s Broadcast: 🏮 The Paperclip
Cyber F.M.

Cyber F.M.

3 likes

Oscar Esparza Hacker

Oscar Esparza Hacker

0 likes

+it’s less than 80$✨❗️LINK for this item in my bio❗️
Details⬇️: This flip phone smartphone with a flip keyboard design, offering both the convenience of a traditional keypad and the functionality of a modern touchscreen device. With 4GB of internal storage, you'll have plenty of space for apps, photos, and more. The compact 3.5" displa
Atlas

Atlas

443 likes

How to stay ahead of the game instead of just vibe coding simple front end products
When I released my first SaaS tool, I though it would save me from having to worry about the complexities of infrastructure and backend stuff. But no and I also realized most people don’t even know these things!! Also, if you are looking for jobs, these areas will see a rise (ppl are alr hiring for
Vaishnavi | building khaa-lo

Vaishnavi | building khaa-lo

0 likes

How to Make a Dyson Sphere in Sandboxels
#dysonsphere #science #sciencegames #gaming #pixelart
R74n

R74n

7 likes

A vibrant cover image featuring Anjali Viramgama amidst confetti, with the title "Top Cybersecurity Certificates." It highlights key certifications for advancing skills and knowledge in cybersecurity.
A card detailing the Certified Information Security Manager (CISM) certification. It explains CISM focuses on managing information security programs, covering risk management, governance, and incident response.
A card detailing the Certified Ethical Hacker (CEH) certification. It explains CEH focuses on ethical hacking and penetration testing, covering topics like network scanning, malware threats, and social engineering.
Top Cybersecurity Certificates
There are several reputable cybersecurity certifications that can help you advance your skills and knowledge in the field of cybersecurity. 1. Certified Information Systems Security Professional (CISSP): - CISSP is a globally recognized certification that covers a wide range of cybersecurit
anjali.gama

anjali.gama

112 likes

A colorful Disney tattoo of Stitch from Lilo & Stitch on an arm, featuring a watercolor-style blue and purple splatter background. The character is depicted with a wide, happy grin and outstretched arms, showcasing a vibrant and playful design.
A Disney tattoo on an arm featuring Thumper from Bambi, sitting among purple and blue flowers and tall grass. The tattoo includes the text "Macushla R.I.P. Johnny" below the character, rendered in a traditional tattoo style.
A traditional-style Disney tattoo on a leg depicting Esmeralda from The Hunchback of Notre Dame. She is shown in a flowing purple dress, holding a large crescent moon or hoop, surrounded by golden stars. The text "From my flash! Tiny blast over" is visible.
🏰✨Disney Tattoos✨🏰
Did you know, I’m a HUGE Disney nerd! It’s always a treat whenever I get to do something based on Disney, small or big, flash or custom 🥰 Here’s just a small compilation of some of my favorites! #disney #disneytattoo #tattoo #tattooartist #traditionaltattoo
Malware 🔜 FC

Malware 🔜 FC

375 likes

Why I switched to taking notes on my iPad
I used to love writing in notebooks, but after switching to my iPad, I can confidently say I’m never going back! Here’s why: ✨ Cuter Notes – Let’s be real…aesthetic notes make studying more enjoyable! I can use custom colors, cute stickers, and different handwriting styles to make my notes visua
Rebecca R.

Rebecca R.

263 likes

Back Up Outlook Emails to an External Hard Drive
Need to back up your Outlook emails to an external hard drive? Here are 2 simple methods to help you out. Download AOMEI Backupper and give it a try! #backup #outlook #externalharddrive
SmoothTechie

SmoothTechie

1 like

📍USB Write Protected? Fix It Instantly
Seeing “The disk is write-protected” error on your USB drive? This quick guide shows how to remove write protection and regain full access to your files. Learn how to check the physical lock switch, use DiskPart commands, repair file system errors, and fix registry issues step by step. Many cases a
XanthusTechCore

XanthusTechCore

5 likes

#movie #foryou #fyp
Lllla.movie

Lllla.movie

3 likes

A phone screen displays eSIM settings, showing an active AT&T eSIM with a phone number, an option to add a new eSIM, and primary SIM settings.
The title of an article, 'What Can Someone Do With Your SIM Card? (How To Secure It)', published on February 8, 2024, with author details.
Text discussing the risks of a stolen SIM card, including an example of $68,000 stolen via a SIM swap, and noting the rise in SIM card attacks.
my physical sim card from my original AT&T smartphone has been stolen out of my Samsung Galaxy Fold7
Dougintime

Dougintime

5 likes

A black journal featuring a white drawing of Jack Skellington's face and stars, held by a hand.
A journal spread featuring handwritten lyrics for "Sally's Song" from The Nightmare Before Christmas, adorned with various character stickers from the movie.
A journal spread with religious quotes and Bible verses about hope, rejoice, and faith, decorated with cross stickers and floral designs.
Journal Spreads ive done recently
okay its been a few months but so far i did great with all the stickers i love buyings stickers now as a comfort thing idk how to say it ig? but overall my journal spreads look so good so far i hope yall like it js as much as i do<3 anywho im waiting for an upcoming concert to add i cant wait to
mal<3

mal<3

162 likes

Files Copied to USB Drive Disappear? Lets Recover
Copied files to your USB drive, then they vanished? This issue is often caused by hidden files, unsafe ejection, corruption, or failing flash storage. This guide shows how to reveal hidden files, repair USB errors, and recover missing data safely before it gets overwritten. #usb #datarecovery
XanthusTechCore

XanthusTechCore

3 likes

Elite Hacker Destroyed His Empire By Forgetting On
Bro, I really forgot to use a VPN 💀 #hacker #cybercrime #fail #tech #arrestedstupidly
arrestedstupidly

arrestedstupidly

1 like

virus
👍Pros :
Visible Simulation

Visible Simulation

1 like

Never plug your phone or computer into usb plugs in hotels or airports here’s why 👇🏼 A USB port doesn’t just deliver power, it can also transfer data. A compromised hotel USB outlet could secretly install malware on your phone or copy your data without you realizing it. Hotels, airports, and o
Cybersecurity Girl

Cybersecurity Girl

151 likes

#fy #fyp #fypシ゚viral #horrorgame Just tired of getting jumped😭, go subscribe to my YT channel.
dis-MALware

dis-MALware

3 likes

A woman wearing a black outfit and a large pearl necklace smiles while sitting in a room with rows of green chairs. Other individuals are visible in the background. The image features Lemon8 branding with the username @angelawrivers.
Hackers hijacked antivirus features to install mal
Hackers hijacked antivirus features to install malware - here's what we know https://www.yahoo.com/tech/cybersecurity/articles/hackers-hijacked-antivirus-features-install-140500891.html #hackers #malware #cybersecurity #antivirus
angela1957

angela1957

1 like

Google probably installed an AI on your computer. Let’s get rid of it together #fyp
PiratePrincessJess

PiratePrincessJess

0 likes

A desk setup with a curved monitor displaying a pink grid wallpaper and pixel art juice boxes. An overlay on the screen reads "How to Make Your PC Run Faster – 5 Easy Tips!". A keyboard, laptop, and drink are on the desk, with a Lemon8 watermark.
A desk setup with a monitor displaying tips for a faster PC, including "Upgrade Your Storage & RAM," "Keep Your Drivers & OS Updated," and "Check for Malware & Viruses." An overlay highlights "Upgrade Your Storage & RAM and more!" with a Lemon8 watermark.
A desk setup with a monitor displaying instructions for "Disable Startup Programs" and "Clean Temporary Files." The screen shows steps like using Task Manager and deleting temporary files. A keyboard, laptop, and drink are on the desk, with a Lemon8 watermark.
⚡ How to Make Your PC Run Faster – 5 Easy Tips! 🖥️🔥
💡 1. Disable Startup Programs 🚀 Too many apps launching at startup slow down your PC! ✅ Open Task Manager (Ctrl + Shift + Esc) ✅ Go to the Startup tab ✅ Disable unnecessary apps to speed up boot time 💡 2. Clean Temporary Files 🗑️ Over time, junk files slow your system down. ✅ Press Win
skaeszun

skaeszun

284 likes

A laptop displays the NordVPN website, showing 'Security status Protected' and a map of the United States, illustrating the best VPN service for secure browsing.
A laptop screen shows an error message on Max, 'This Is Uncharted Territory,' indicating content is not available in the region, highlighting accessibility issues when traveling.
A laptop displays a VPN app interface with a list of countries like Italy and United States, demonstrating access to all regions worldwide for as low as $3.99/month.
the best VPN for all your needs!
NordVPN is a great tool to have if you want to access all websites from any region! (traveling or not). It keeps your connection secure on public Wi-Fi, protecting your data from hackers. Plus, it lets you access academic resources or websites that might be restricted in certain countries if you ar
Anaïs D’Ottavio

Anaïs D’Ottavio

13 likes

Unable to Initialize Hard Drive? Fix it Now
Find out how you can fix this issue and initialize your hard drive with ease using Partition Assistant, ensuring no data is lost during the process. #hdd #fix #repair #disk
SmoothTechie

SmoothTechie

0 likes

Don’t Use Airport USB Chargers!
TSA is now advising NOT to use Airport USB Chargers. Bring your own USB charging bricks. "Hackers can install malware at USB ports (we’ve been told that’s called 'juice/port jacking'). So, when you’re at an airport do not plug your phone directly into a USB port. Bring your TSA-compl
Destination & Travel Junkies

Destination & Travel Junkies

151 likes

If you’re staring at Cricut Design Space with zero ideas this is for you! This free SVG website is perfect when you need inspiration fast. Save & share with your crafty bestie 💖 #designinspo #creativeart #DesignProcess #cricutprojects #CricutTutorial
VlunaWorks

VlunaWorks

2 likes

#evakuasi #sidoajo #fyp
abesso

abesso

1 like

Malicious Android App
Cybercriminals are using fake ATT apps to distribute malware #cybersecurity #Android
Lemon8er

Lemon8er

0 likes

look world on TikTok right now removing my freedom of speech constitutional rights and laws sound on my video scary mutherfckers y'all post to be the baddest Donald Trump collapse they all under the tables on all 4 like a dog when it get real y'all know how to run judgement day here for all
glentrump359

glentrump359

0 likes

See more