Menu
24matins.uk
Navigation : 
  • News
    • Business
    • Recipe
    • Sport
  • World
  • Health
  • Culture
  • Tech
    • Science
Currently : 
  • Entertainment
  • Health
  • Tech
  • International

RatOn: The New Android Trojan Raising Alarms Among Cybersecurity Experts

Tech
By James Carter,  published 17 September 2025 at 6h01, updated on 17 September 2025 at 6h01.
Tech

Cybersecurity specialists are raising concerns over RatOn, a recently identified Android Trojan. This malicious software has emerged as a potential threat to mobile device users, prompting warnings from experts and increased vigilance within the cybersecurity community.

TL;DR

  • RatOn, a new Android banking Trojan, emerged from scratch.
  • Targets users via malicious apps outside official stores.
  • Remote theft and ransomware risks; vigilance strongly advised.
  • A New Kind of Android Threat Emerges

    The ever-evolving world of **banking malware** on Android has just witnessed the arrival of a particularly alarming adversary. Known as RatOn, this Trojan has raised eyebrows among cybersecurity experts, not least because it appears to have been developed entirely from scratch—without borrowing any existing code, an unusual and sophisticated feat in this domain.

    Sophisticated Tactics Set RatOn Apart

    What makes RatOn especially concerning is its intricate operating method, a cut above what’s usually seen in mobile malware. The threat was first detected during an investigation into the notorious NFSkate malware, itself infamous for exploiting NFC technology to steal information. Unlike its predecessors, RatOn doesn’t lurk within a single rogue app but is distributed across several applications as part of a concerted campaign.

    To ensnare victims, cybercriminals are luring users through adult-themed websites—often leveraging URLs containing “TikTok18+”—which encourage downloading malicious apps from outside the official Google Play Store. The specific tricks used to funnel people to these sites remain unclear, but historically, attackers have relied on phishing emails, direct messages on social networks, and bogus advertisements.

    Remote Attacks and Expanded Capabilities

    Once installed, RatOn springs into action with chilling efficiency. Users are prompted to enable installations from “unknown sources,” thus sidestepping Android’s built-in protections. The app then requests critical privileges such as accessibility services and device administrator rights. With these permissions in hand, the malware can:

  • Launch overlay attacks to steal banking credentials.
  • Simulate ransomware incidents to demand payment.
  • Automate remote bank transfers using advanced accessibility exploits.
  • Unlike some **NFC-based** attacks that require physical proximity for data theft, RatOn operates entirely remotely—making it all the more insidious for unsuspecting device owners.

    Looming Risks and Recommended Precautions

    So far, only users in the Czech Republic appear to be affected by this campaign. However, there is little assurance that its reach will remain limited; history shows how swiftly such threats can spread globally.

    To stay ahead of this new breed of malware, experts advise:

    • Avoid installing apps from unofficial sources.
    • Keep Google Play Protect enabled and monitor it regularly.
    • Remove unused applications from your device.
    • Never click suspicious links received via email or social platforms.

    As cybercriminals continually reinvent their techniques—often surprising even seasoned professionals—maintaining strict digital hygiene is increasingly vital against such advanced threats.

    Le Récap
    • TL;DR
    • A New Kind of Android Threat Emerges
    • Sophisticated Tactics Set RatOn Apart
    • Remote Attacks and Expanded Capabilities
    • Looming Risks and Recommended Precautions
    • About Us
    © 2026 - All rights reserved on 24matins.uk site content