Automatically translated.View original post

New malware SURXRAT helps hackers log in

The new malware, SURXRAT, allows hackers to fully log in to Android.

The type of malware that can be called coming up today will not be able to escape the remote access trojan type of malware, which has a wide range of systems, and now Android systems have fallen victim to this type of malware again.

According to a report by the website, Cyberpress has mentioned the detection of a new RAT type of malware that focuses on the implementation of the Android operating system. This malware, named SURXRAT, is distributed as malware for rental (MaaS or Malware-as-a-Service) on the famous chat platform Telegram under the name "SURXRAT V5" (making it predicted that the detected one is not the first, but has already been developed to the fifth generation). The rental will be in a monthly subscription form, which the sales system will allow the reseller to distribute the version. Custom can also be adapted to customers. According to a review of the Telegram channel that distributed the malware, there were hackers from Indonesia behind it.

The ability of this malware can be called the ability to spy on the victim and take control of the victim's machine. After installation, the malware gives the malware hackers the right to take over the victim's system. The capabilities of this malware are as follows:

Data Collection and Exfiltration is the ability to access sensitive data on the machine, such as call logs, short messages (SMS or Short Message Service), Location, etc. These data are sent to a C2 or Command and Control server running on a Firebase basis with the ability to smooth (Blending) malware data to data communicating with cloud services.

Remote Device Control The malware allows hackers to gain full control through commands such as:

Access is used for data access on Clipboard.

Lock to operate the screen lock system.

For Data Wipe

Wal used to change the background image (Wallpaper)

Brow is used to search the browser history.

The ability to form is similar to Ransomware-like malware by relying on the ability to log screens and change background images, allowing hackers to lock screens and turn background images into messages threatening victims for extortion.

Artificial Intelligence by malware can download AI models from digital archives such as Hugging Face to help with malware and hackers.

Technically, after the malware is installed on the victim's machine, the malware deceives the victim's access to the system. From the requested permissions, the malware and active hackers can access the data storage, contacts, SMS messages and locations.

After the malware is granted, the malware will contact the C2 server and immediately start smuggling the stolen data from the victim's machine back to the server. In addition, the malware will register itself as a common application to guarantee persistence on the system (Persistence) and access the Disabled Assistance Mode or Accessibility Mode to gain complete control of the machine without the victim having to interact with the malware.

# Trending # Lemon 8 Howtoo # lemon 8 diary # Malware # freedomhack

3/18 Edited to

Related posts

Why I switched to taking notes on my iPad
I used to love writing in notebooks, but after switching to my iPad, I can confidently say I’m never going back! Here’s why: ✨ Cuter Notes – Let’s be real…aesthetic notes make studying more enjoyable! I can use custom colors, cute stickers, and different handwriting styles to make my notes visua
Rebecca R.

Rebecca R.

262 likes

It's no secret that Karol G just slayed the #Grammys #Glambot . #AwardsSeason
user6854050772614

user6854050772614

5 likes

Hackers hijacked antivirus features to install mal
Hackers hijacked antivirus features to install malware - here's what we know https://www.yahoo.com/tech/cybersecurity/articles/hackers-hijacked-antivirus-features-install-140500891.html #hackers #malware #cybersecurity #antivirus
angela1957

angela1957

1 like

Don’t Use Airport USB Chargers!
TSA is now advising NOT to use Airport USB Chargers. Bring your own USB charging bricks. "Hackers can install malware at USB ports (we’ve been told that’s called 'juice/port jacking'). So, when you’re at an airport do not plug your phone directly into a USB port. Bring your TSA-compl
Destination & Travel Junkies

Destination & Travel Junkies

151 likes

Tech Hacks For Beginners 📲💻😬
I have some great tips for non-tech savvy tech users. I know these tips will help you learn your tech more quickly and effectively. 1. Keep Your Devices Updated Why It Helps: Updates often contain security patches and improvements that help your device run smoothly. Tip: Enable automatic updat
Joy 📚

Joy 📚

282 likes

SOS!!! Wha do you do if you click a phishing email link… two times?!? So far I have: 1, added two factor sign on 2, changed my passwords 3, stress cried and spiraled But for real. What do you do… how do I know if there is now malware (? Is that what it’s called ?) living on my computer?!?
Alexandra Wildeson

Alexandra Wildeson

2 likes

Tips for pursuing a career in cybersecurity
1. Build a Strong Technical Foundation A solid understanding of systems, networks, and programming is essential for identifying and mitigating security threats. • Learn networking basics (e.g., TCP/IP, firewalls, VPNs). • Gain familiarity with operating systems (Windows, Linux)
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

129 likes

+it’s less than 80$✨❗️LINK for this item in my bio❗️
Details⬇️: This flip phone smartphone with a flip keyboard design, offering both the convenience of a traditional keypad and the functionality of a modern touchscreen device. With 4GB of internal storage, you'll have plenty of space for apps, photos, and more. The compact 3.5" displa
Atlas

Atlas

443 likes

Developing a career in cybersecurity
Hey All! 👋 Want to stay safe online and protect your data? Cybersecurity knowledge is essential. It helps you secure your personal information and understand how to safeguard your digital footprint. Let’s dive into why it’s crucial! 💻🔒 Why Cybersecurity Matters Cybersecurity is about protecting
Meghana

Meghana

547 likes

Check out this website that helps you when you’re feeling uninspired! I walk you thru the process of downloading the svg file to taking it to cricut design space! Happy crafting. #designinspo #creativeart #cricutprojects #svgfiles #CricutTips
VlunaWorks

VlunaWorks

30 likes

Elite Hacker Destroyed His Empire By Forgetting On
Bro, I really forgot to use a VPN 💀 #hacker #cybercrime #fail #tech #arrestedstupidly
arrestedstupidly

arrestedstupidly

1 like

the best VPN for all your needs!
NordVPN is a great tool to have if you want to access all websites from any region! (traveling or not). It keeps your connection secure on public Wi-Fi, protecting your data from hackers. Plus, it lets you access academic resources or websites that might be restricted in certain countries if you ar
Anaïs D’Ottavio

Anaïs D’Ottavio

12 likes

You need TikTok ?
Here is how you can download TikTok if you need help with and apple phone just ask me I can help with Apple phone you need to change your region on the Apple Pay store
Ali

Ali

10 likes

A series I’ve wanted to do forever! As a cyber security expert and bridal makeup artist I hope to share cyber concepts in easy to understand makeup metaphors! Let me know in the comments what topics interest you 💕 #makeupandmalware #mascara #cybersecurity @Lancôme
Betsy H

Betsy H

3 likes

Back Up Outlook Emails to an External Hard Drive
Need to back up your Outlook emails to an external hard drive? Here are 2 simple methods to help you out. Download AOMEI Backupper and give it a try! #backup #outlook #externalharddrive
SmoothTechie

SmoothTechie

1 like

Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

102 likes

This video has been sitting in my drafts since 2025. Not because it wasn’t good, but because I waited for “perfect.” Just the same way we take the perfect picture and over staring at it, opens up the imperfections in the photo🤣🤣🤣 Today, I realized the message in this video still matters: persona
Abby❤️💎

Abby❤️💎

1 like

my physical sim card from my original AT&T smartphone has been stolen out of my Samsung Galaxy Fold7
Dougintime

Dougintime

4 likes

🧠 Would YOU plug in a random USB? Jamie did… and almost let hackers into his system. ⚠️ This comic shows a real cybersecurity trick: USB Baiting — where attackers drop infected drives hoping someone connects them. 👀 Learn what a Trojan is 🔐 Discover how to spot dangerous files 💬 Drop a 🛑
CyberSnack

CyberSnack

1 like

Unable to Initialize Hard Drive? Fix it Now
Find out how you can fix this issue and initialize your hard drive with ease using Partition Assistant, ensuring no data is lost during the process. #hdd #fix #repair #disk
SmoothTechie

SmoothTechie

0 likes

⚡ How to Make Your PC Run Faster – 5 Easy Tips! 🖥️🔥
💡 1. Disable Startup Programs 🚀 Too many apps launching at startup slow down your PC! ✅ Open Task Manager (Ctrl + Shift + Esc) ✅ Go to the Startup tab ✅ Disable unnecessary apps to speed up boot time 💡 2. Clean Temporary Files 🗑️ Over time, junk files slow your system down. ✅ Press Win
skaeszun

skaeszun

284 likes

Mac Productivity Apps: Make More Time for YOU! 💻
Let’s talk about one of the most important things in our daily routines—our workflow. Whether you’re working for yourself, managing a side hustle, or simply trying to keep everything in check, examining and refining your workflow is key to getting more done with less stress. 💪 By finding simple, ef
Cas Lin

Cas Lin

35 likes

#stitch with @Steve-O’s Wild Ride! Podcast & @Drew On Spotify | what do you think? 🤔 I suggest checking out @The Hacking Games to support your kids! 💥 #videogames #onlinesafety #parentinghacks #momsoftiktokover30
Fareedah | Protect Kids Online

Fareedah | Protect Kids Online

5 likes

Never plug your phone or computer into usb plugs in hotels or airports here’s why 👇🏼 A USB port doesn’t just deliver power, it can also transfer data. A compromised hotel USB outlet could secretly install malware on your phone or copy your data without you realizing it. Hotels, airports, and o
Cybersecurity Girl

Cybersecurity Girl

146 likes

Revelry in the Dark
#myheroacademia #mha #bokunoheroacademia #bnha #tokoyami
Malware X20

Malware X20

5 likes

How to Make a Dyson Sphere in Sandboxels
#dysonsphere #science #sciencegames #gaming #pixelart
R74n

R74n

7 likes

Indiana Mish (meesh)

Indiana Mish (meesh)

0 likes

External Hard Drive Showing Empty? How to Fix?
Plugged in your external hard drive but found it empty? Here are a few easy fixes you can try! If your files are lost, use AOMEI FastRecovery to bring them back. Giveaway license code: code.aomeitech.com Discount code: Special30OFF  #externalharddrive #recovery #harddrive #empty
SmoothTechie

SmoothTechie

1 like

Top Cybersecurity Certificates
There are several reputable cybersecurity certifications that can help you advance your skills and knowledge in the field of cybersecurity. 1. Certified Information Systems Security Professional (CISSP): - CISSP is a globally recognized certification that covers a wide range of cybersecurit
anjali.gama

anjali.gama

110 likes

Day 3 of 31: 31 days to a safer you. Did you know hackers can turn on your webcam without you ever noticing? 🎥👀 it happens when malware sneaks onto your device and gives cybercriminals access to your camera. That means your most private moments could be exposed. ✅ Here’s how to protect yours
Cybersecurity Girl

Cybersecurity Girl

21 likes

The Podcast Invite Scheme! Always remember - it’s not your fault ♥️ this happens to so many people. Most importantly: STAY SUSPICIOUS OF EVERYTHING 🥰💕 #podcastinvite #podcast #creator #storytime #scheme
Chloe

Chloe

66 likes

Oscar Esparza Hacker

Oscar Esparza Hacker

0 likes

🏰✨Disney Tattoos✨🏰
Did you know, I’m a HUGE Disney nerd! It’s always a treat whenever I get to do something based on Disney, small or big, flash or custom 🥰 Here’s just a small compilation of some of my favorites! #disney #disneytattoo #tattoo #tattooartist #traditionaltattoo
Malware 🔜 FC

Malware 🔜 FC

375 likes

#fy #fyp #fypシ゚viral #horrorgame Just tired of getting jumped😭, go subscribe to my YT channel.
dis-MALware

dis-MALware

3 likes

Setting Spray is the makeup equivalent to mulifactor authentication and it’s a must have! Follow along to learn more about cybersecurity from a pro makeup artist and cyber expert 🤌🏻
Betsy H

Betsy H

1 like

🚨 16 Billion passwords leaked - the largest breach ever 🚨 Here is how it happened and what you can do to be safe. #news #databreach #cybersecuritytips #onlinesafety
Cybersecurity Girl

Cybersecurity Girl

83 likes

#movie #foryou #fyp
Lllla.movie

Lllla.movie

3 likes

virus
👍Pros :
F3X

F3X

1 like

New macOS Malware
New malware targeting macOS with an information stealer program that is designed to take your online information. #macos #cyber
Lemon8er

Lemon8er

0 likes

Ai in Cybersecurity
Artificial Intelligence isn’t replacing cybersecurity professionals, it’s amplifying them. AI doesn’t sleep. It learns, detects, and defends faster than ever before. This is what modern cybersecurity looks like “intelligence with intuition.” #Cybersecurity #AIinCybersecurity #dataprivacy
Abby❤️💎

Abby❤️💎

0 likes

Hackers are using Google.com to deliver malware
Hackers are using Google.com to deliver malware by bypassing antivirus software and here is how to stay safe https://www.msn.com/en-us/news/technology/hackers-are-using-google-com-to-deliver-malware-by-bypassing-antivirus-software-here-s-how-to-stay-safe/ar-AA1GIDSi?ocid=sapphireappshare #hackers
angela1957

angela1957

0 likes

Favorite Apps in One Subscription for Mac & iOS
Why Setapp is a Must-Have: One Subscription, Many Apps: Access 240+ premium apps for a single monthly price—no need for separate subscriptions.  Easy Search & Download: Find the perfect productivity tool with a simple search and download it instantly.  Streamlined Workflow: Organize your
Reverelia

Reverelia

50 likes

𝕋𝕙𝕚𝕤 𝕚𝕟𝕗𝕠 𝕚𝕤 𝕞𝕠𝕣𝕖 𝕗𝕠𝕣 𝕡𝕖𝕠𝕡𝕝𝕖 𝕨𝕚𝕥𝕙 𝕒𝕟𝕕𝕣𝕠𝕚𝕕𝕤.💡
𝓓𝓲𝓿𝓪 𝓙.✨

𝓓𝓲𝓿𝓪 𝓙.✨

9 likes

watch the whole video like share and follow me
#fypシ
John Damico

John Damico

1 like

See more