New Android RAT Uses Near Field Communication to Automatically Steal Money From Devices
RatOn malware automates money transfers and hijacks cryptocurrency wallets on Android devices to exploit Czech bank users, posing growing risks to financial systems, researchers said.
9 Articles
9 Articles
New Android RAT uses Near Field Communication to automatically steal money from devices - WorldNL Magazine
(Image credit: wk1003mike / Shutterstock) RatOn is a rare Android trojan combining NFC relay, overlay attacks, and automated money transfersIt targets banking apps and crypto wallets, stealing PINs and recovery phrasesSpread via fake TikTok apps, it mainly targets users in Czechia and Slovakia Security researchers have uncovered a rare strain of Android malware with capabilities that were “virtually unheard of” - until now.Earlier this week, Th…


New Android banking trojan RatOn threatens U.S. banks
Researchers warn the malware can steal money, drain crypto wallets and enable NFC relay fraud. Currently, it targets a bank in the Czech Republic.
RatOn Android Malware Detected With NFC Relay And ATS Banking Fraud Capabilities - Cybernoz - Cybersecurity News
Sep 09, 2025Ravie LakshmananMobile Security / Threat Intelligence A new Android malware called RatOn evolved from a basic tool capable of conducting Near Field Communication (NFC) attacks to a sophisticated remote access trojan with Automated Transfer System (ATS) capabilities to conduct device fraud. “RatOn merges traditional overlay attacks with automatic money transfers and NFC relay functionality – making it a uniquely powerful threat,” t…
RatOn Hijacks Bank Account to Launch Automated Money Transfers
Dubbed RatOn, that combines traditional overlay attacks with NFC relay tactics to hijack bank accounts and initiate automated money transfers. Developed from scratch by a threat actor group observed since July 2025, RatOn represents a significant evolution in mobile fraud… Read more → The post RatOn Hijacks Bank Account to Launch Automated Money Transfers appeared first on IT Security News.
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium