Legitimate Android applications often fall prey to hacking, with instances of hackers injecting malicious code into popular software available on the Google Play Store. A recent study conducted by ESET, a cyber security firm, has revealed that a widely used application called iRecorder – Screen Recorder is secretly distributing Remote Access Trojan (RAT) to users secretly and without their awareness. Used to be.
See also: WhatsApp to eliminate spam calls and messages with username feature; everything is new here
The fact that the software was posted on the Play Store in 2021 without any harmful functionality is what makes this story so intriguing. However, with the release of version 1.3.8 of iRecorder – Screen Recorder in August 2022, the software began spreading malware to even the highest-end Android devices. If you have this app loaded on your smartphone, ESET has reported it to Google and they have since removed it from the Play Store.
Here’s how to use the in-built app on your Android device to record the screen, should you be interested in doing so. That way you can stay away from suspicious programs like iRecorder – Screen Recorder. ESET’s iRecorder – Screen Recorder software, now known as AhRat, includes a modified version of the free and open-source AhMyth Android Rat.
See also: WWDC 2023: From VR headset to MacBook, here are the expected launches on June 5
If this virus infects a user’s smartphone, it will start recording audio and send it to a Command and Control (C&C) server under the control of the attackers. However, the malware can take over any data stored on the hacked device, including images, movies, documents, and even bookmarks.
According to ESET’s assessment, the malicious actions of the program formerly known as iRecorder – Screen Recorder indicate that it is now participating in an espionage effort. However, the researchers were not able to pin the software on any specific cybercrime organization.
Legitimate Android applications often fall prey to hacking, with instances of hackers injecting malicious code into popular software available on the Google Play Store. A recent study conducted by ESET, a cyber security firm, has revealed that a widely used application called iRecorder – Screen Recorder is secretly distributing Remote Access Trojan (RAT) to users secretly and without their awareness. Used to be.
See also: WhatsApp to eliminate spam calls and messages with username feature; everything is new here
The fact that the software was posted on the Play Store in 2021 without any harmful functionality is what makes this story so intriguing. However, with the release of version 1.3.8 of iRecorder – Screen Recorder in August 2022, the software began spreading malware to even the highest-end Android devices. If you have this app loaded on your smartphone, ESET has reported it to Google and they have since removed it from the Play Store.
Here’s how to use the in-built app on your Android device to record the screen, should you be interested in doing so. That way you can stay away from suspicious programs like iRecorder – Screen Recorder. ESET’s iRecorder – Screen Recorder software, now known as AhRat, includes a modified version of the free and open-source AhMyth Android Rat.
See also: WWDC 2023: From VR headset to MacBook, here are the expected launches on June 5
If this virus infects a user’s smartphone, it will start recording audio and send it to a Command and Control (C&C) server under the control of the attackers. However, the malware can take over any data stored on the hacked device, including images, movies, documents, and even bookmarks.
According to ESET’s assessment, the malicious actions of the program formerly known as iRecorder – Screen Recorder indicate that it is now participating in an espionage effort. However, the researchers were not able to pin the software on any specific cybercrime organization.











