
This might have been done by the official developer not wanting to reveal his/her identity to Kuwait Oil Company.Ĭurrently, it is not known whether or not the attempts of Kuwait Oil Company to disclose the OmniRAT author were related to the raid of the German police force. The features described are as follows:ĭue to all the events surrounding OmniRAT lately, the official web page is disabled at the moment. Nevertheless, the facts show that the developer did indeed want to sell the OmniRAT for cybercriminals, as he or she posted the well-known underground forum, whose visitors that are novices in the illegal industry of hacking. By purchasing and using OmniRAT, you obey the above. This is also stated inside our terms of service.

The usage, however, is only licit on devices you own or have permission for. While the developer denies involvement in cybercriminal activities, a post on hacking forums points to the other directionĪn official has posted on the official website of OmniRAT that this tool is for legitimate use only and every user should obey such rules, however, it seems that these rules were not minded by everyone: Although the company itself was not involved in this incident, KPC provided demands to identify the domain owner of the, a site used to distribute the tool.Īnother event that involved OmniRAT surfaced in 2017 when cybersecurity experts uncovered a group of unknown hackers who used the application to spy on a terrorist group of Islamic State (also known as ISIS) and distributed the malicious payload through the Telegram messaging application. The trickiest part of this attempt was that hackers distributed the malicious Excel document that allegedly contained a business profile of a well-known oil company KPC (Kuwait Petroleum Corporation).

#Droidjack androrat code
Unknown hackers launched a cyber attack campaign that targeted numerous organizations with the help of CVE-2016-7262 remote code execution vulnerability in a Microsoft Excel file, which consequently installed the RAT on the device. In one of the instances where the remote access tool was used to illegally spy on users occurred in January this year.
#Droidjack androrat software
OmniRAT software spread via malicious Excel file in the past The action comes due to recent cyber attacks that were closely related to the misuse of the tool, and the developer is suspected in taking part. The house of OmniRAT developer was recently raided by German law enforcement and computing devices like laptops and phones confiscated for an alleged checkup. It is not the first instance of remote access tools being misused – DroidJack, AndroRAT, DarkComet, and many others. Once installed, the app allows remote access to the device, without the owner knowing that excessive spying is taking place.
#Droidjack androrat android
The application was being sold online for a mere $25-$100 online, which only encouraged cybercriminals to misuse it for illegitimate spying activities on Windows, Linux, Mac, and Android devices.Īdvertised as a parental control tool for remote administration, OmniRAT is often distributed with the help of malicious SMS, phishing emails, and other methods.

OmniRAT software is a Remote Access Tool that was first spotted being used for malicious activities in November 2015 in Germany.

OmniRAT software developer's house searched for purposes of investigation on latest spying attempts which involved this tool OmniRAT developer was surprised by a visit from the German police, which confiscated digital footprint devices
