Oblivion Android RAT Emerges, Hijacks Devices for $300 Monthly

Oblivion: The $300 Android RAT That Silently Hijacks Devices

A newly identified Android Remote Access Trojan (RAT) named Oblivion has emerged as a significant threat to mobile security. Available for as little as $300 per month on public hacking forums, this malware is engineered to covertly take control of Android devices without the user’s knowledge.

Key Features of Oblivion:

– Broad Compatibility: Oblivion targets Android versions 8 through 16, encompassing a vast majority of active devices.

– User-Friendly Deployment: The malware includes a point-and-click builder, enabling attackers without advanced coding skills to create and deploy malicious apps effortlessly.

– Stealth Operations: Oblivion operates undetected, having undergone over four months of live environment testing without triggering behavioral detections.

Subscription Model:

Oblivion is offered through a subscription model, with pricing tiers ranging from $300 for a one-month license to $2,200 for lifetime access. Notably, purchasers do not receive access to the source code, ensuring control remains with the original seller.

Capabilities Upon Infection:

Once installed on a device, Oblivion grants attackers extensive control, including:

– SMS Interception: Capturing messages, including two-factor authentication codes.

– Push Notification Access: Reading notifications from banking and other sensitive apps.

– Keystroke Logging: Recording every input made by the user.

– File Management: Accessing, modifying, and deleting files.

– App Control: Remotely launching or uninstalling applications.

– Device Unlocking: Automatically unlocking the device using captured PINs.

Hidden Remote Control Mechanism:

A standout feature of Oblivion is its Hidden Virtual Network Computing (HVNC) capability. Unlike standard VNC, which allows remote viewing and control of a device, HVNC operates entirely out of the victim’s view. While the user’s screen displays a convincing System updating… animation, the attacker maintains full interactive control in a concealed environment running in the background. This overlay is customizable and can mimic various routine screens, such as system updates or antivirus scans, to avoid raising suspicion.

Infection Methodology:

Oblivion employs a sophisticated infection strategy:

1. Dropper Builder: The malware utilizes a Dropper Builder to generate a fake Google Play update prompt. Attackers can customize the app name, icon, and delivery screen to enhance credibility.

2. Social Engineering: Victims receive an Update Required notification, guiding them through enabling installations from unknown sources—a tactic that appears routine and trustworthy.

3. Automated Permission Bypass: Once installed, Oblivion automatically bypasses Android’s Accessibility Service permissions without any user action. This technique is effective across major custom Android interfaces, including Samsung One UI, Xiaomi MIUI/HyperOS, OPPO ColorOS, Honor MagicOS, and OnePlus OxygenOS.

Implications and Recommendations:

The emergence of Oblivion underscores the evolving sophistication of mobile malware and the importance of vigilant security practices. To mitigate the risk of infection:

– Install Apps from Trusted Sources: Only download applications directly from the Google Play Store.

– Be Cautious of Unexpected Prompts: Treat any unsolicited pop-ups requesting updates or installations from outside the Play Store with suspicion, as legitimate Android updates are not delivered this way.

– Regularly Review Permissions: Periodically check Settings > Accessibility and revoke permissions from unfamiliar apps.

– Respond to Anomalies Promptly: If a device unexpectedly displays a loading or system update screen after installing an app from an external source, power it off and conduct a security scan immediately.

By adhering to these practices, users can significantly reduce the risk of falling victim to sophisticated threats like Oblivion.