New Android malware campaign “DogeRAT” targets Indian users

As technology continues to advance, so does the sophistication of malware. In a new campaign targeting Android users, a Trojan called DogeRAT has been uncovered. The malware is primarily aimed at Indian users and is distributed via social media and messaging apps. While it is often disguised as legitimate applications, such as Netflix or Instagram, it is instead used to steal sensitive information from the unsuspecting victim.

An overview of DogeRAT

DogeRAT is a Remote Access Trojan (RAT), a type of malware that allows a perpetrator to remotely control and take over an infected system. Specifically designed for Android devices, the malware is Java-based. Once installed, it is capable of infiltrating the device and gathering sensitive data, including contacts, messages, and banking credentials. In a report by cybersecurity firm CloudSEK, it is revealed that the malware’s developers have gone to great lengths to ensure that their product is as effective as possible.

Distribution of DogeRAT through social media and messaging platforms

The distribution of DogeRAT is one of the malware’s key features that has been a source of concern for security experts. Unfortunately, it is often distributed through social media and messaging platforms under the guise of legitimate applications, such as Opera Mini, OpenAI ChatGOT, and premium versions of Netflix, Instagram, and YouTube. Unknowingly, users are tricked into downloading the malware onto their device, which leads to dire consequences.

Information stolen by DogeRAT

As previously mentioned, once installed, DogeRAT is capable of accessing highly sensitive information, including personal contact details, messages, and banking credentials. The malware also has other capabilities, such as taking screenshots, stealing images, capturing clipboard content, and logging keystrokes. These features make DogeRAT a dangerous tool in the hands of cybercriminals.

Promotion of DogeRAT by its developer through Telegram channel

DogeRAT is a typical malware-as-a-service (MaaS) offering that has become increasingly common in recent times. The malware is promoted by its India-based developer through a Telegram channel. Since its creation, the channel has gained over 2,100 subscribers. The developer offers a premium subscription for a remarkably low price of $30. This subscription includes additional capabilities that are not included in the free version of the malware.

Availability of Free Version of DogeRAT on GitHub

The free version of DogeRAT is readily available on GitHub. Along with the malware, the user can also view screenshots and video tutorials that showcase its functions. However, the developer includes a disclaimer that puts all responsibility for any consequences that may arise from the use of the software on the user.

Intrusive Permissions Requested by DogeRAT Upon Installation

Upon installation, DogeRAT requests intrusive permissions to perform its data-gathering objectives, giving attackers further access to sensitive information. This intrusive behavior is a cause for concern as it shows how the malware is specifically designed to deeply infiltrate an Android device.

Description of LEMONJUICE, a new Android backdoor, detailed by Mandiant

In addition to DogeRAT, Mandiant recently detailed another Android backdoor known as LEMONJUICE. This backdoor is designed to give remote control and access to a compromised device. The module is distributed via a marketing software development kit (SDK). It is tailored to collect sensitive information stored on the device, copy and substitute clipboard contents, among other capabilities.

The discovery of DogeRAT is a worrying sign of how advanced malware is becoming. The malware’s developers have gone to great lengths to ensure that it is as effective as possible. It is essential to stay vigilant and ensure that devices are protected from such threats. The availability and distribution of malware such as DogeRAT shows that it is more important than ever to stay informed and up-to-date on the latest threats to our cybersecurity.

Explore more

How Firm Size Shapes Embedded Finance Strategy

The rapid transformation of mundane business platforms into sophisticated financial ecosystems has effectively redrawn the competitive boundaries for companies operating in the modern economy. In this environment, the integration of banking, payments, and lending services directly into a non-financial company’s digital interface is no longer a luxury for the avant-garde but a baseline requirement for economic viability. Whether a company

What Is Embedded Finance vs. BaaS in the 2026 Landscape?

The modern consumer no longer wakes up with the intention of visiting a bank, because the very concept of a financial institution has migrated from a physical storefront into the digital oxygen of everyday life. This transformation marks the definitive end of banking as a standalone chore, replacing it with a fluid experience where capital management is an invisible byproduct

How Can Payroll Analytics Improve Government Efficiency?

While the hum of a government office often suggests a routine of paperwork and protocol, the digital pulses within its payroll systems represent the heartbeat of a nation’s economic stability. In many public administrations, payroll data is viewed as little more than a digital receipt—a record of transactions that concludes once a salary reaches a bank account. Yet, this information

Global RPA Market to Hit $50 Billion by 2033 as AI Adoption Surges

The quiet hum of high-speed data processing has replaced the frantic clicking of keyboards in modern back offices, marking a permanent shift in how global businesses manage their most critical internal operations. This transition is not merely about speed; it is about the fundamental transformation of human-led workflows into self-sustaining digital systems. As organizations move deeper into the current decade,

New AGILE Framework to Guide AI in Canada’s Financial Sector

The quiet hum of servers across Canada’s financial heartland now dictates more than just basic transactions; it increasingly determines who qualifies for a mortgage or how a retirement fund reacts to global volatility. As algorithms transition from the shadows of back-office automation to the forefront of consumer-facing decisions, the stakes for oversight have never been higher. The findings from the