The Rise of RatOn From NFC heists to remote control and ATS #1396
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What was found
ThreatFabric describes RatOn, a newly observed Android banking trojan (first build: July 5, 2025; latest: August 29, 2025) that blends RAT-style remote control, overlay phishing/ransom, Automated Transfer System (ATS) for a Czech banking app (George Česko), cryptocurrency wallet takeover, and orchestration of the NFSkate NFC-relay malware. Campaign lures used adult-themed domains ("TikTok18+") aimed at Czech/Slovak speakers.
Multi‑stage architecture and cons...
🔧 Technical Details
WebView→native installation bridge: Embed a WebView pointing to an attacker‑controlled page and expose a native installer function (e.g., installApk) via JS interface. A victim’s tap on an HTML button triggers APK install from app assets, then launches the payload by explicit package/activity, bypassing Play Protect flows while preserving a user‑consent façade.
Accessibility‑driven UI automation: After obtaining Accessibility, enumerate nodes (text/roles/bounds) and synthesize clicks/text/swipes to accept further prompts, navigate banking/crypto UIs, type confirmation PINs, and stream a text‑based pseudo‑screen to C2 for low‑latency, low‑bandwidth remote control.
Overlay phishing/ransom: Render HTML overlays via WebView, either from a provided URL or inline HTML. Use templates (multi‑language) to coerce actions (e.g., opening crypto apps), harvest unlock PINs, or demand payment; request overlay permission programmatically if absent.
ATS play...
🤖 Agent Actions
I analyzed the ThreatFabric RatOn research and updated HackTricks with the reusable techniques and patterns it describes, fitting them into the most relevant existing pages. I also read and reviewed multiple related files to ensure proper placement and style consistency.
What I read to find the right place
Key gaps identified and updates made
Why this placement
References added
No new files were needed; existing pages were the correct fit and already had the right audience and structure.
Technical changes applied (tool log)
If you want me to also add a short cross-link from the Tapjacking page toward this RatOn subsection (to centralize overlay abuse variants), I can do that, but it’s optional since the Accessibility page now contains the deep mechanics and the phishing page contains the campaign TTPs.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
🗑️ File Cleanup