Cybercrime
,
Endpoint Security
,
Fraud Management & Cybercrime
‘Cyber Android RAT’ Can Capture WhatsApp History, Crypto Seed Phrases

Cybercriminals are advertising on criminal hacking online boards an Android remote access Trojan that can steal victims’ WhatsApp conversation history, surveil them in real time and extract cryptocurrency seed phrases for the low price of about $500 a month.
See Also: The Healthcare CISO’s Guide to Medical IoT Security
The seller behind the “Cyber Android RAT” markets it “as ‘the most advanced Android RAT in the market, coded from scratch by a professional team,'” reports mobile security firm Certo.
Supported by a command-and-control platform dubbed “Cyber Nebula Core,” the RAT includes comprehensive passive and active surveillance such as live microphone streaming and real-time video from cameras on both sides of a device. Access to it can be held for $499 a month or $2,500 for lifetime access. “The RAT is positioned as a premium product aimed at serious buyers,” Certo said.
A hidden virtual network computing feature “allows the operator to take full control of the device and use it as if they physically had it in their hands, while being completely invisible to the user.”
Screenshots provided in the report depict the hidden VNC module tested on a Samsung device showing zero indication of threat activity for victims.
But perhaps the most technically sophisticated feature, Certo said, is the automated cryptocurrency theft system. The module targets crypto wallets – namely MetaMask and Binance – on devices, launching an automated transfer system to lift funds from victims via “programmatic automation,” not overlay attacks.
Cyber Android RAT navigates through crypto wallets or app interfaces, stealing credentials – again with no visible signs of activity.
Keylogger functions run simultaneously alongside both monitoring and crypto modules, capturing keystrokes to gain access to encrypted messaging apps like Telegram or WhatsApp. The RAT also includes a dedicated module for WhatsApp message extraction.
What sets the module apart from traditional keylogging is retrieval of “historical message data” rather than prioritization of “future inputs” from users, while a notification interceptor tracks notifications from “WhatsApp, Gmail and banking apps,” reports Certo.
Cyber Android RAT also has the ability to “download, upload and delete files” remotely, with the file explorer providing access to a user’s internal storage and SD card. Certo-provided screenshots show a directory of a fully compromised device, including digital camera images and documents.
It claims full compatibility across all Android versions and devices. With no evidence of region-specific marketing or targeting as of yet, researchers believe it is likely intended for global deployment.
