Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New 0 Cellik RAT Grants Android Control, Trojanizes Google Play Apps

New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps

Posted on December 17, 2025December 17, 2025 By CWS

A newly recognized Android distant entry trojan (RAT) features a one-click APK builder to wrap its payload inside respectable purposes, cellular safety agency iVerify reviews.

Dubbed Cellik, the RAT supplies attackers with full management over the contaminated units, and consists of real-time surveillance capabilities like these present in superior adware.

These embrace display screen streaming in actual time, keylogging, distant entry to digital camera and microphone, notification interception, a system for stealing information from different purposes, and hidden shopping.

As soon as put in on a tool, the Cellik Android RAT permits attackers to remotely management the UI, and to simulate faucets or swipes.

Moreover, it permits operators to flick thru recordsdata, delete information, obtain or add recordsdata, and entry cloud storage providers linked to the telephone.

The malware comes with a hidden browser module that runs invisibly on the machine, enabling attackers to navigate remotely to web sites, click on on hyperlinks, and fill out types, all whereas the attacker receives a stream of screenshots in actual time.

“Utilizing the hidden browser, a cybercriminal may quietly log into web sites utilizing the sufferer’s saved cookies, or auto-fill credentials on phishing pages. Cellik can seize any kind information submitted within the hidden browser, so if the sufferer is tricked into getting into passwords or bank card data, the RAT will intercept these particulars,” iVerify says.

Cellik may also show overlays on high of different purposes, comparable to faux login screens that intercept credentials. It comes with an injector lab for constructing customized injections concentrating on totally different purposes, and helps a number of simultaneous injections throughout purposes.

In response to iVerify, the Cellik Android RAT additionally options Google Play integration, enabling attackers to browse the applying catalog and choose respectable apps to bundle with the malicious payload.Commercial. Scroll to proceed studying.

Utilizing the RAT’s built-in toolkit, menace actors can bundle purposes with the Cellik payload remotely, with a single click on.

“This implies a cybercriminal can take a well-liked app (like a sport or utility that targets are prone to set up), insert Cellik’s code into it, and repackage it as an installer, all utilizing Cellik’s built-in toolkit,” iVerify notes.

Cellik is being supplied on the darkish net at $150 per 30 days. A one-month subscription with RDP prices $200, whereas a lifetime subscription is $900.

“What units Cellik aside is its Play Retailer app integration and the sheer breadth of its capabilities for the value level. These options embrace superior location monitoring, real-time multimedia seize, communications surveillance, crypto-wallet theft, and even AI pushed evaluation of person conduct,” iVerify notes.

Associated: New Albiriox Android Malware Developed by Russian Cybercriminals

Associated: Landfall Android Spy ware Focused Samsung Telephones through Zero-Day

Associated: Anatsa Android Banking Trojan Now Concentrating on 830 Monetary Apps

Associated: Undetectable Android Spy ware Backfires, Leaks 62,000 Person Logins

Security Week News Tags:Android, Apps, Cellik, Control, Google, Grants, Play, RAT, Trojanizes

Post navigation

Previous Post: Chinese Hackers Using Custom ShadowPad IIS Listener Module to Turn Compromised Servers into Active Nodes
Next Post: Hacker Conversations: Alex Hall, One-time Fraudster

Related Posts

SesameOp Malware Abuses OpenAI API  SesameOp Malware Abuses OpenAI API  Security Week News
Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying  Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying  Security Week News
Spyware Maker NSO Ordered to Pay 7 Million Over WhatsApp Hack Spyware Maker NSO Ordered to Pay $167 Million Over WhatsApp Hack Security Week News
New ClickFix Variant Exploits Windows Terminal New ClickFix Variant Exploits Windows Terminal Security Week News
iOS Exploit Kit Coruna Updates Past Exploits iOS Exploit Kit Coruna Updates Past Exploits Security Week News
OpenClaw Flaw Could Allow AI Takeover via Malicious Sites OpenClaw Flaw Could Allow AI Takeover via Malicious Sites Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark