Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New 0 Cellik RAT Grants Android Control, Trojanizes Google Play Apps

New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps

Posted on December 17, 2025December 17, 2025 By CWS

A newly recognized Android distant entry trojan (RAT) features a one-click APK builder to wrap its payload inside respectable purposes, cellular safety agency iVerify reviews.

Dubbed Cellik, the RAT supplies attackers with full management over the contaminated units, and consists of real-time surveillance capabilities like these present in superior adware.

These embrace display screen streaming in actual time, keylogging, distant entry to digital camera and microphone, notification interception, a system for stealing information from different purposes, and hidden shopping.

As soon as put in on a tool, the Cellik Android RAT permits attackers to remotely management the UI, and to simulate faucets or swipes.

Moreover, it permits operators to flick thru recordsdata, delete information, obtain or add recordsdata, and entry cloud storage providers linked to the telephone.

The malware comes with a hidden browser module that runs invisibly on the machine, enabling attackers to navigate remotely to web sites, click on on hyperlinks, and fill out types, all whereas the attacker receives a stream of screenshots in actual time.

“Utilizing the hidden browser, a cybercriminal may quietly log into web sites utilizing the sufferer’s saved cookies, or auto-fill credentials on phishing pages. Cellik can seize any kind information submitted within the hidden browser, so if the sufferer is tricked into getting into passwords or bank card data, the RAT will intercept these particulars,” iVerify says.

Cellik may also show overlays on high of different purposes, comparable to faux login screens that intercept credentials. It comes with an injector lab for constructing customized injections concentrating on totally different purposes, and helps a number of simultaneous injections throughout purposes.

In response to iVerify, the Cellik Android RAT additionally options Google Play integration, enabling attackers to browse the applying catalog and choose respectable apps to bundle with the malicious payload.Commercial. Scroll to proceed studying.

Utilizing the RAT’s built-in toolkit, menace actors can bundle purposes with the Cellik payload remotely, with a single click on.

“This implies a cybercriminal can take a well-liked app (like a sport or utility that targets are prone to set up), insert Cellik’s code into it, and repackage it as an installer, all utilizing Cellik’s built-in toolkit,” iVerify notes.

Cellik is being supplied on the darkish net at $150 per 30 days. A one-month subscription with RDP prices $200, whereas a lifetime subscription is $900.

“What units Cellik aside is its Play Retailer app integration and the sheer breadth of its capabilities for the value level. These options embrace superior location monitoring, real-time multimedia seize, communications surveillance, crypto-wallet theft, and even AI pushed evaluation of person conduct,” iVerify notes.

Associated: New Albiriox Android Malware Developed by Russian Cybercriminals

Associated: Landfall Android Spy ware Focused Samsung Telephones through Zero-Day

Associated: Anatsa Android Banking Trojan Now Concentrating on 830 Monetary Apps

Associated: Undetectable Android Spy ware Backfires, Leaks 62,000 Person Logins

Security Week News Tags:Android, Apps, Cellik, Control, Google, Grants, Play, RAT, Trojanizes

Post navigation

Previous Post: Chinese Hackers Using Custom ShadowPad IIS Listener Module to Turn Compromised Servers into Active Nodes
Next Post: Hacker Conversations: Alex Hall, One-time Fraudster

Related Posts

Meta Paid Out  Million via Bug Bounty Program in 2025 Meta Paid Out $4 Million via Bug Bounty Program in 2025 Security Week News
Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day Security Week News
High-Severity Flaws Patched in Chrome, Firefox High-Severity Flaws Patched in Chrome, Firefox Security Week News
Armis Raises 5 Million in Pre-IPO Funding Round at .1 Billion Valuation Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation Security Week News
Vulnerabilities Expose Helmholz Industrial Routers to Hacking Vulnerabilities Expose Helmholz Industrial Routers to Hacking Security Week News
Black Hat USA 2025 – Summary of Vendor Announcements (Part 1) Black Hat USA 2025 – Summary of Vendor Announcements (Part 1) Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark