A new and dangerous Remote Access Trojan (RAT) named Cellik RAT has emerged, specifically targeting Android users. This potent malware grants attackers full control over compromised Android devices and is capable of trojanizing legitimate Google Play applications.
The Cellik RAT is notably inexpensive, available for just $150 on underground forums. Its low cost combined with powerful capabilities makes it an accessible tool for a broad range of cybercriminals, significantly increasing the threat landscape for Android users.
Capabilities of Cellik RAT
The Cellik RAT provides attackers with extensive control over a compromised Android device. This includes the ability to remotely execute commands, access personal data, and manipulate device functions. Its functionality as a remote access tool means that once installed, an attacker can effectively operate the victim’s device as if it were in their hands.
One of the most concerning features of Cellik RAT is its ability to trojanize Google Play apps. This means that malicious code can be injected into seemingly legitimate applications available on the official Google Play Store. When unsuspecting users download and install these trojanized apps, they inadvertently install the Cellik RAT, granting attackers control over their device.
Protecting Against Android Malware Threats
The emergence of Cellik RAT highlights the persistent threat of Android malware and the risks associated with downloading applications. Even apps from official sources like Google Play can sometimes be compromised through trojanization techniques.
Users are advised to exercise extreme caution when downloading new applications, even from trusted sources. Regularly checking app permissions, keeping the Android operating system updated, and utilizing reputable mobile security solutions are essential steps to mitigate the risk of falling victim to malware like Cellik RAT.
Source: https://www.securityweek.com/new-150-cellik-rat-grants-android-control-trojanizes-google-play-apps/