New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps
The malware provides full device control and real-time surveillance capabilities like those of advanced spyware. The post New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps appeared first on SecurityWeek .
AI Analysis
Technical Summary
Cellik RAT is a recently discovered Remote Access Trojan targeting Android devices, sold for approximately $150, which provides attackers with extensive control over infected devices. The malware is notable for trojanizing legitimate Google Play Store applications, embedding malicious code into otherwise trusted apps to facilitate stealthy distribution and infection. Once installed, Cellik RAT grants attackers full device control, including capabilities for real-time surveillance such as microphone and camera access, location tracking, and data exfiltration. This level of control is comparable to advanced spyware, enabling persistent monitoring and potential manipulation of device functions. The malware does not require elevated privileges beyond those granted to typical apps, relying on social engineering to convince users to install the trojanized apps. Although no known exploits are currently active in the wild, the commercial availability of the RAT lowers the barrier for cybercriminals and potentially state-sponsored actors to deploy it widely. The lack of specific affected versions or patches indicates that the threat is more about distribution tactics than exploiting a particular vulnerability. The medium severity rating reflects the current assessment but may evolve as more information emerges. The malware's presence in the Google Play ecosystem raises concerns about supply chain security and the effectiveness of app vetting processes. Organizations relying on Android devices, especially those with sensitive data or regulatory compliance requirements, face risks of data breaches, espionage, and operational disruption.
Potential Impact
For European organizations, Cellik RAT poses significant risks to confidentiality, integrity, and availability of mobile endpoints. The malware's ability to perform real-time surveillance and data exfiltration threatens sensitive corporate information and personal data, potentially leading to regulatory violations under GDPR. Compromised devices can serve as entry points for broader network infiltration or lateral movement, increasing the risk of widespread compromise. The stealthy infection vector via trojanized Google Play apps complicates detection and response efforts, potentially allowing prolonged undetected access. Organizations with mobile workforces or BYOD policies are particularly vulnerable, as infected devices may connect to corporate networks. The reputational damage from breaches involving employee devices can be substantial, especially in sectors like finance, healthcare, and government. Additionally, the malware's commercial availability suggests a growing ecosystem of affordable, sophisticated Android threats, increasing the likelihood of targeted attacks against European enterprises. The absence of known exploits in the wild currently limits immediate impact but does not preclude future active campaigns. Overall, the threat could disrupt business operations, compromise intellectual property, and erode trust in mobile device security.
Mitigation Recommendations
To mitigate the risk posed by Cellik RAT, European organizations should implement a multi-layered mobile security strategy. First, enforce strict application control policies, restricting installations to verified and vetted apps from official sources, and consider using enterprise app stores or Mobile Application Management (MAM) solutions. Deploy advanced Mobile Threat Defense (MTD) platforms capable of detecting behavioral anomalies and known malware signatures, including trojanized apps. Conduct regular security awareness training focused on mobile threats and the risks of installing untrusted applications. Implement endpoint detection and response (EDR) tools that extend to mobile devices to enable rapid detection and containment. Monitor network traffic for unusual patterns indicative of data exfiltration or command-and-control communications. Apply the principle of least privilege for app permissions, limiting access to sensitive device functions. Regularly update mobile operating systems and apps to reduce exposure to vulnerabilities. Finally, establish incident response plans that include mobile device compromise scenarios and ensure timely forensic analysis and remediation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps
Description
The malware provides full device control and real-time surveillance capabilities like those of advanced spyware. The post New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps appeared first on SecurityWeek .
AI-Powered Analysis
Technical Analysis
Cellik RAT is a recently discovered Remote Access Trojan targeting Android devices, sold for approximately $150, which provides attackers with extensive control over infected devices. The malware is notable for trojanizing legitimate Google Play Store applications, embedding malicious code into otherwise trusted apps to facilitate stealthy distribution and infection. Once installed, Cellik RAT grants attackers full device control, including capabilities for real-time surveillance such as microphone and camera access, location tracking, and data exfiltration. This level of control is comparable to advanced spyware, enabling persistent monitoring and potential manipulation of device functions. The malware does not require elevated privileges beyond those granted to typical apps, relying on social engineering to convince users to install the trojanized apps. Although no known exploits are currently active in the wild, the commercial availability of the RAT lowers the barrier for cybercriminals and potentially state-sponsored actors to deploy it widely. The lack of specific affected versions or patches indicates that the threat is more about distribution tactics than exploiting a particular vulnerability. The medium severity rating reflects the current assessment but may evolve as more information emerges. The malware's presence in the Google Play ecosystem raises concerns about supply chain security and the effectiveness of app vetting processes. Organizations relying on Android devices, especially those with sensitive data or regulatory compliance requirements, face risks of data breaches, espionage, and operational disruption.
Potential Impact
For European organizations, Cellik RAT poses significant risks to confidentiality, integrity, and availability of mobile endpoints. The malware's ability to perform real-time surveillance and data exfiltration threatens sensitive corporate information and personal data, potentially leading to regulatory violations under GDPR. Compromised devices can serve as entry points for broader network infiltration or lateral movement, increasing the risk of widespread compromise. The stealthy infection vector via trojanized Google Play apps complicates detection and response efforts, potentially allowing prolonged undetected access. Organizations with mobile workforces or BYOD policies are particularly vulnerable, as infected devices may connect to corporate networks. The reputational damage from breaches involving employee devices can be substantial, especially in sectors like finance, healthcare, and government. Additionally, the malware's commercial availability suggests a growing ecosystem of affordable, sophisticated Android threats, increasing the likelihood of targeted attacks against European enterprises. The absence of known exploits in the wild currently limits immediate impact but does not preclude future active campaigns. Overall, the threat could disrupt business operations, compromise intellectual property, and erode trust in mobile device security.
Mitigation Recommendations
To mitigate the risk posed by Cellik RAT, European organizations should implement a multi-layered mobile security strategy. First, enforce strict application control policies, restricting installations to verified and vetted apps from official sources, and consider using enterprise app stores or Mobile Application Management (MAM) solutions. Deploy advanced Mobile Threat Defense (MTD) platforms capable of detecting behavioral anomalies and known malware signatures, including trojanized apps. Conduct regular security awareness training focused on mobile threats and the risks of installing untrusted applications. Implement endpoint detection and response (EDR) tools that extend to mobile devices to enable rapid detection and containment. Monitor network traffic for unusual patterns indicative of data exfiltration or command-and-control communications. Apply the principle of least privilege for app permissions, limiting access to sensitive device functions. Regularly update mobile operating systems and apps to reduce exposure to vulnerabilities. Finally, establish incident response plans that include mobile device compromise scenarios and ensure timely forensic analysis and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 6942a8fbd5dc0d5a04f881ad
Added to database: 12/17/2025, 12:58:35 PM
Last enriched: 12/17/2025, 12:58:49 PM
Last updated: 12/18/2025, 11:50:30 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
France Probes ‘Foreign Interference’ After Remote Control Malware Found on Passenger Ferry
MediumThreatFox IOCs for 2025-12-17
MediumKimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
MediumParked Domains Become Weapons with Direct Search Advertising
MediumNew ClickFix Attack Uses Fake Browser Fix to Install DarkGate Malware on Your Device
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.