Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps

Posted on December 17, 2025December 17, 2025 By CWS

A newly recognized Android distant entry trojan (RAT) features a one-click APK builder to wrap its payload inside respectable purposes, cellular safety agency iVerify reviews.

Dubbed Cellik, the RAT supplies attackers with full management over the contaminated units, and consists of real-time surveillance capabilities like these present in superior adware.

These embrace display screen streaming in actual time, keylogging, distant entry to digital camera and microphone, notification interception, a system for stealing information from different purposes, and hidden shopping.

As soon as put in on a tool, the Cellik Android RAT permits attackers to remotely management the UI, and to simulate faucets or swipes.

Moreover, it permits operators to flick thru recordsdata, delete information, obtain or add recordsdata, and entry cloud storage providers linked to the telephone.

The malware comes with a hidden browser module that runs invisibly on the machine, enabling attackers to navigate remotely to web sites, click on on hyperlinks, and fill out types, all whereas the attacker receives a stream of screenshots in actual time.

“Utilizing the hidden browser, a cybercriminal may quietly log into web sites utilizing the sufferer’s saved cookies, or auto-fill credentials on phishing pages. Cellik can seize any kind information submitted within the hidden browser, so if the sufferer is tricked into getting into passwords or bank card data, the RAT will intercept these particulars,” iVerify says.

Cellik may also show overlays on high of different purposes, comparable to faux login screens that intercept credentials. It comes with an injector lab for constructing customized injections concentrating on totally different purposes, and helps a number of simultaneous injections throughout purposes.

In response to iVerify, the Cellik Android RAT additionally options Google Play integration, enabling attackers to browse the applying catalog and choose respectable apps to bundle with the malicious payload.Commercial. Scroll to proceed studying.

Utilizing the RAT’s built-in toolkit, menace actors can bundle purposes with the Cellik payload remotely, with a single click on.

“This implies a cybercriminal can take a well-liked app (like a sport or utility that targets are prone to set up), insert Cellik’s code into it, and repackage it as an installer, all utilizing Cellik’s built-in toolkit,” iVerify notes.

Cellik is being supplied on the darkish net at $150 per 30 days. A one-month subscription with RDP prices $200, whereas a lifetime subscription is $900.

“What units Cellik aside is its Play Retailer app integration and the sheer breadth of its capabilities for the value level. These options embrace superior location monitoring, real-time multimedia seize, communications surveillance, crypto-wallet theft, and even AI pushed evaluation of person conduct,” iVerify notes.

Associated: New Albiriox Android Malware Developed by Russian Cybercriminals

Associated: Landfall Android Spy ware Focused Samsung Telephones through Zero-Day

Associated: Anatsa Android Banking Trojan Now Concentrating on 830 Monetary Apps

Associated: Undetectable Android Spy ware Backfires, Leaks 62,000 Person Logins

Security Week News Tags:Android, Apps, Cellik, Control, Google, Grants, Play, RAT, Trojanizes

Post navigation

Previous Post: Chinese Hackers Using Custom ShadowPad IIS Listener Module to Turn Compromised Servers into Active Nodes
Next Post: Hacker Conversations: Alex Hall, One-time Fraudster

Related Posts

Recent 7-Zip Vulnerability Exploited in Attacks Security Week News
Printer Company Procolored Served Infected Software for Months Security Week News
Tiffany Data Breach Impacts Thousands of Customers Security Week News
Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025 Security Week News
US Offers $10 Million for Three Russian Energy Firm Hackers Security Week News
Account Takeover Fraud Caused $262 Million in Losses in 2025: FBI Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays
  • INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin
  • OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays
  • INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin
  • OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark