Description

In an August 2023 study, cybersecurity firm Cyfirma named EVLF as the mastermind behind the malware strains CypherRAT and CraxsRAT. These malicious tools are intended to provide attackers with remote access to victim devices, including control of cameras, microphones, and locations. EVLF, which operates as a malware-as-a-service (MaaS) architecture, provides CypherRAT and CraxsRAT to fellow cybercriminals, and it is estimated that during the last three years, around 100 separate threat actors have obtained lifetime licences for these tools. Since at least September 2022, EVLF has been running a web shop to market their creations, where CraxsRAT, one of the most dangerous RATs in the current Android threat landscape, allows threat actors to manipulate infected devices remotely from a Windows computer, and updates are released based on customer feedback. The CraxsRAT malware is built with a builder, which allows for customization, payload obfuscation, icon selection, app name, and the activation of desired features and permissions upon installation. Cyfirma stated that CraxsRAT has significant functionalities such as bypassing Google Play Protect, live screen viewing, and a command execution shell, and its 'Super Mod' feature makes it difficult for victims to uninstall the app (such as when the victim tries to uninstall, the page crashes). EVLF is renowned for distributing malware via its GitHub account; however, a few of them have been removed by Microsoft; nonetheless, EVLF's GitHub account remains online. Furthermore, on August 23, 2023, EVLF released a statement on their Telegram channel signalling the project's termination, most likely in response to the revelation of their operations.