RatON on Android: Full Analysis of the Banking Trojan

  • RatON combines overlays, ATS and NFC relay for financial fraud.
  • It is distributed via fake websites and requests critical permissions such as accessibility.
  • Target banking apps and crypto wallets; lock your phone with lures.

What does the RatON Trojan do?

The RatON Trojan emerged as one of the most disturbing Android viruses. of recent times: a threat that combines automated financial fraud, screen spoofing, device locking, and NFC relay attacks. While its initial deployment has been observed in Central Europe, its modular design and pace of development suggest it could spread without significant barriers if appropriate prevention and response measures are not taken.

Far from being a recycled variant, ThreatFabric analysts conclude that RatON has been built from the ground up, which complicates its detection by traditional firms and allows it to incorporate techniques uncommon in mobile devices, such as NFC relay, which focuses on fraud. Throughout this analysis, we unravel how it's distributed, what permissions it abuses, what it can do once inside, and, above all, how to neutralize it before it compromises your data and your money.

What is the RatON Trojan and why is it different?

RatON is a remote access Trojan for Android With advanced banking capabilities, it stands out for three pillars: money transfer automation, fake screen overlays, and NFC relaying. This trio makes it especially dangerous because it allows it to steal credentials, move funds without human interaction, and visually deceive the victim with ransomware-like locks and notes.

Unlike other families, RatON does not share code with known TrojansThis technical originality raises the bar, as signature- or similarity-based security engines are less effective. Furthermore, it has evolved from an NFC-focused tool to integrating an Automated Transfer (ATS) system, demonstrating active development and a clear focus on monetization at scale.

Discord DoubleTrouble Banking Trojan
Related article:
The DoubleTrouble Trojan exploits Discord to attack Android banking users.

Origin and distribution campaign

The first samples were detected July 5, 2025 and again on August 29, 2025, dates that point to an accelerated evolution cycle. The known campaign has primarily targeted Czech and Slovak-speaking users, with particular interest in a specific local banking app, suggesting collaboration with money mule networks to channel transfers.

To attract victims, The operators hosted fraudulent pages that imitated the Google Play Store and offered a supposedly adult version of TikTok, under the TikTok 18+ banner. While not all traffic capture vectors are known, the lure has proven effective in forcing manual installation and granting critical permissions.

Infection chain and abused permissions

How the RatON Trojan works

The attack starts with a malicious dropper or installer that presents itself as a legitimate app. That first component requests to activate the installation of applications from Unknown origins, allowing it to bypass protective measures such as standard checks and pave the way for the actual payload to be unloaded.

In a second stage, the main payload requests privileged permissions These include accessibility, device administration, reading and writing contacts, and the ability to manage system settings. With this range of permissions, RatON can automate touches, read on-screen content, prevent uninstallation, and change settings without the owner's knowledge.

The third stage adds a key component: download and run NFSkate or NGate, a variant linked to the legitimate NFCGate research tool. This module enables NFC relay attacks using the Ghost Tap technique, documented by ESET in 2024, opening the door to contactless fraud.

Main capabilities of the RatON Trojan

Fake Screen Overlay

RatON uses overlays that mimic screens real apps, especially banking and financial apps, with the aim of stealing credentials or intercepting security steps. This mechanism is also used to simulate a ransom note, giving the appearance of a complete device lockout while the malware works in the background.

Automatic ATS transfers

If you get the device PIN or control through accessibility, RatON can make money movements without intervention of the owner. Its use has been observed against the app George ÄŚesko, automating transfer processes and in practice avoiding the human factor that usually stops less sophisticated frauds.

NFC Relay and Ghost Tap

The Trojan integrates NFC relay functionality This allows an infected device to capture data and send it to another device that completes the transaction, tricking the payment terminal. This vector, uncommon on mobile devices, multiplies the scope of the fraud and demonstrates deep knowledge of the contactless payment ecosystem.

Device lock and ransomware lures

In addition to overlays, the RatON Trojan can lock the device using administrator access, preventing normal use. During this blocking, it displays pages that simulate a phone hijacking and insist on a cryptocurrency payment for the supposed release.

Keylogger and capture of sensitive data

It has keylogger capabilities to record what you type and monitor your interaction with applications. This allows you to capture passwords, codes, and any data that appears on the screen or is entered using the keyboard.

Account takeovers and theft in cryptocurrency apps

RatON has specific modules for crypto wallets such as MetaMask, Trust, Blockchain.com, and Phantom. It is capable of launching these applications, unlocking them with a previously captured PIN, navigating through the options, and exfiltrating seed phrases or recovery secrets, which are then sent to servers controlled by the attackers.

The ransom note deception

One of the most disturbing maneuvers is the overlay of a fake ransom note It accuses the victim of viewing or distributing illegal material and demands a $200 payment in cryptocurrency within two hours. The goal isn't so much to collect the ransom, but rather to force the victim to open their targeted crypto app, at which point the malware captures the PIN and completes the compromise.

While the fake lock screen imposes urgency, The RatON Trojan operates in the background, executing automated actions on financial apps, making it difficult for the user to perceive the real intrusion and react in time.

List of known commands

The researchers documented a wide catalog of remote orders that the Trojan understands and executes. These allow for everything from device manipulation to data exfiltration or the deployment of new modules:

  • send_push: Sends fake push notifications to induce actions.
  • screen_lock: Change the screen lock timeout and management.
  • WhatsApp: Launches the messaging app.
  • app_inject: Modifies the list of target financial applications for overlays.
  • update_device: Returns the list of installed apps and other device metadata.
  • send_sms: Send SMS messages taking advantage of accessibility.
  • Facebook: launches the social network app.
  • nfs: Download and run the NFSkate APK module for NFC attacks.
  • transfer: Run ATS with the George ÄŚesko banking app.
  • block: Lock the device using administrative privileges.
  • add_contact: creates a new contact in the address book.
  • Record: Start a streaming or screenshot session.
  • screen: Turns screen casting on or off.

Geographic targets and potential victims

The known activity has been focused on the Czech Republic, with signs of expansion into Slovakia. The focus on a specific banking app suggests optimization for a local financial ecosystem, which is common when players have regional monetization infrastructure.

Still, the malware's own architecture indicates that their transfer to other countries It would be viable with minor adjustments, especially if operators add ATS injections and flows for new banking entities or popular wallets in other markets.

Comparison with other recent threats

RatON is part of a trend of increasingly automated mobile banking Trojans, where direct transfer execution is more prevalent than mere credential theft. Other families targeted by analysts include ToxicPanda, which uses on-device fraud and access abuse, and BingoMod, which stands out for cleaning up its tracks after theft and its campaigns in Italy, Romania, and England.

In Latin America, GoatRAT has fueled instant scams on payment systems like PIX, bypassing SMS-based authentication or traditional credentials. The convergence is clear: automation, overlay, and accessibility control are a formula for silent fraud.

Indicators of Compromise on Your Android

If you notice Accessibility permissions activated for no reasonIf you experience any changes to your screen lock, apps that open automatically, or overlays that prevent you from interacting with the screen, a malicious app is likely at work. Urgent messages requesting cryptocurrency payments or screens that mimic a complete device lock are also suspicious.

Unauthorized movements in bank accounts or crypto wallets, unusual push notifications and requests to install apps from unknown sources are signs that require an immediate review of your device and financial activity.

What to do if you suspect a RatON Trojan infection?

At the slightest suspicion, acts quickly and methodically To minimize damage, avoid interacting with fake ransom notes or links within pop-up screens, as they're designed to force you into making mistakes.

  • Disconnect the internet: Turn off mobile data and Wi-Fi to cut off the malware’s communication with its servers.
  • Do not follow suspicious indications: Ignore links, attachments, and supposed support pop-up instructions.
  • Revoke sensitive permissions: Remove accessibility and device administration from Settings if you can still access it.
  • Reboot into safe mode: This way you can prevent third-party apps from running and uninstall them with less hassle.
  • Scan with reputable solutions: Use Google Play Protect and, if possible, a trusted mobile antivirus.
  • Uninstall recent or unknown apps- Removes any APK installed outside the official store.
  • Change passwords and activate 2FA: Do it from another clean device, prioritizing banking and cryptocurrencies.
  • Backup and restore: If the symptoms persist, consider restoring to factory settings from a secure backup.
  • Ask for professional help: especially if the mobile is corporate or contains sensitive information.

Good prevention practices

The best defense is do not install apps outside of Google Play Nor enable unknown sources except in absolutely justified cases. Official stores apply additional filters and analysis that significantly reduce exposure to malware.

fakecall malware android-1
Related article:
FakeCall: How the banking Trojan that hijacks calls on Android works

Review with a critical eye the permissions that each application requestsAccessibility and device administration should only be enabled for fully trusted apps, and if possible, only temporarily. Keep the system and all apps up to date.

Google Play Protect must always be active, although remember that its coverage isn't as extensive when you sideload. Complementing it with an antimalware solution from a reputable vendor adds an extra layer that can make all the difference. It also prevents malvertising and always download from official sources.

Trojan operating model step by step

At the tactical level, the RatON attack chain follows These stages with quite a bit of consistency: Recruitment via pages that mimic the Play Store with an attractive bait, manual installation with user consent, requesting critical permissions, and downloading the payload that adds NFC and ATS capabilities.

Once active, maps installed financial appsIt displays overlays when you open a targeted app, attempts to capture PINs and credentials, and if successful, automates transactions or exfiltrates recovery secrets in the case of crypto wallets. In parallel, it can lock your device and display a blackmail screen as a distraction.

Who is behind the RatON Trojan and why does it matter?

Research points to a group identified as NFSkate In the initial distribution, strengthening the connection with the NFC module of the same name. The focus on specific countries and specific apps reveals a controlled testing phase that could be scaled if the operation proves profitable.

This iterative approach and the absence of legacy code complicate purely signature-based defense, highlighting the need for behavioral measures, permission control, and user education to break the cycle of infection.

Lures, psychology and coercion

The ransomware note serves a psychological purpose: induce fear and urgency to force the victim to open the targeted crypto app or make impulsive decisions. While paying the ransom doesn't resolve the technical issue, it does pave the way for the theft by forcing the exposure of the unlocking and authorization flow.

Understanding this tactic helps to resist the urge to obey to alarmist messages and focus on defensive actions: isolating the device, revoking permissions, and seeking expert support if necessary.

Professional support and business response

In corporate environments, such an infection can lead to financial losses, data incidents and operational shutdownsHaving a mobile response plan, device inventory, active MDM, and monitoring drastically reduces the impact.

There are specialized suppliers capable of implement proactive defenses and managed services against mobile threats. Firms like E-dea, focused on tailored cybersecurity solutions, can help deploy controls, assess exposure, and mitigate risks before they translate into losses.

Quick FAQ

Can it affect any Android?Yes, as long as the user grants permissions and enables unknown sources. Updated devices with restrictive policies are better protected, but they are not immune to permission misuse.

Is Play Protect enough to block it?It helps and should be enabled, but sideloading and accessibility permissions reduce its effectiveness. Combining good practices with additional security is key.

Does it really block the mobile?You can block using device management and overlays. This blocking can be complete or simulated to distract you while you execute financial fraud.

Why are you focusing on crypto and a specific banking app?? Because maximizes economic returnWallets allow for rapid theft, and in some countries, local banking apps facilitate ATS if malware knows their internal flow.

More than 180 new Android viruses in 2025
Related article:
More than 180 new viruses on Android: overview and measures

Looking at the whole, RatON condenses the worst of modern banking malware: social engineering with convincing lures, automated transfers, accessibility abuse, and a strange NFC relay module. Its combination of simulated locking and silent theft poses a serious challenge, but with responsible installation habits, permission control, active security tools, and a swift response to suspicions, it's possible to drastically reduce attackers' options. Share this guide so more users know about the RatON Trojan..