Was this helpful?
Thumbs UP Thumbs Down

Old Android RAT Returns Smarter and More Dangerous

Smartphone with triangle caution warning icon system error malware.
Android logo on screen.

The Android RAT That Refused to Die

PJobRAT is back; this time, it’s smarter, stealthier, and more dangerous. First spotted targeting Indian military users in 2019, the RAT vanished for years, until now. It’s resurfaced under a new disguise, hiding inside real-looking messaging apps.

This isn’t just another malware scare; it’s an evolved threat capable of spying, stealing, and vanishing without a trace. Security pros say it’s been quietly active for nearly two years, and most users never saw it coming.

Woman typing on her phone

It’s Back But Now in Messaging App Disguise?

Forget shady APKs. The new PJobRAT hides inside fully functional chat apps like “CChat” and “SangaalLite.” They work like real messengers so well that they let infected users talk to each other.

But these apps are stealing your files, contacts, and conversations behind the scenes. It’s not just spyware, it’s full-blown surveillance wrapped in a friendly UI. And if you’re sideloading apps from unofficial websites, you’re exactly who this RAT is hunting.

Scam alert shown on phone

New RAT Can Hijack Your Entire Device

The new version of PJobRAT can now execute shell commands, giving attackers root-level control of infected devices. That means they can extract WhatsApp data, dig through private files, and even remotely make changes to your system.

This isn’t some script kiddie tool anymore. With these capabilities, it’s acting more like a professional spyware suite than an old-school RAT. And it’s hiding its tracks better than ever before.

conceptual hand writing showing spoofing attack business photo showcasing impersonation

Spoofing Attack Strategy Being Used?

Hackers behind PJobRAT aren’t sending suspicious links; they’re tricking users into downloading full apps that look clean and run like legit tools. These spoofed apps mimic popular messaging platforms but are loaded with hidden code that activates surveillance features once installed.

The attackers even host these apps on lookalike WordPress blogs to build trust. Once you’re in, they’re in. And uninstalling isn’t always enough to stop them.

Google play store logo is displayed on smartphone

Google Play Couldn’t Catch This RAT?

Worried it slipped through the Play Store? Good news, it didn’t. Bad news? That doesn’t mean you’re safe. PJobRAT spreads through outside sources, like fake blogs or dodgy sideload links, bypassing Google’s defenses entirely.

While Google Play Protect blocks known versions, sideloaded apps fall through the cracks. And because these apps work like real messengers, most users don’t realize they’ve installed spyware until it’s too late.

View of USA flag

Targets Shift from India to Taiwan, Is US Next?

PJobRAT isn’t sticking to the same targets. Originally aimed at Indian military personnel, the RAT has now expanded to target users in Taiwan. This shift in focus shows how versatile the malware is in attacking military personnel, government workers, and regular civilians alike.

With the same stealthy tactics and evolving features, it’s clear PJobRAT is more than just a regional threat. Its global reach makes it a serious concern for anyone in high-risk professions or sensitive industries. The US is safe for now, but beware, as it might arrive unexpectedly.

Man using AI chatbot on his phone

This RAT Functions Like a Real Chat App

PJobRAT’s creators aren’t just hacking phones, they’re building trust. The RAT now lets victims chat in real time, making it easier for attackers to steal data without raising suspicion.

If you’re chatting with someone on what looks like a legitimate messenger app, you might be communicating with another infected device.

This new capability makes PJobRAT especially insidious; it hides in plain sight, manipulating victims into unknowingly becoming part of the hacker’s network.

Google play logo displayed on phone

No Play Store Needed for This RAT to Hit

PJobRAT isn’t relying on Google Play to spread; it’s using legitimate-looking, hacked websites. Malicious apps are embedded in WordPress blogs, so unsuspecting users might download them thinking they’re safe.

Since these apps aren’t listed on Play, Google’s automatic protection won’t catch them. So if you’re downloading from third-party sources, especially ones that look like blogs, you could easily end up with a RAT hiding in your device.

WhatsApp app on Play Store with hacked text in the background.

Now Able to Steal WhatsApp Data Too?

The latest version of PJobRAT has a dangerous new trick: it can extract WhatsApp data. Your messages, contact lists, and multimedia files are now fair game for attackers. It can target your conversations with friends, family, and even colleagues, all while remaining undetected.

With the added ability to breach popular apps like WhatsApp, the RAT has escalated from a nuisance to a full-scale surveillance tool, capable of destroying privacy in real time.

Uninstalling screen on a laptop

How It Silently Uninstalls Itself?

One of PJobRAT’s most sneaky features? It can uninstall itself without your knowledge. After infecting your device and stealing data, it wipes itself clean, leaving no traces behind. You’ll think everything’s fine, but the damage is already done.

This self-erasing feature makes PJobRAT especially hard to detect and remove. Once the RAT’s mission is complete, it disappears without a trace; only the stolen data remains in the attacker’s hands.

Smartphone with triangle caution warning icon system error malware.

No One’s Safe From This Upgraded RAT

PJobRAT initially made waves by targeting high-profile users, such as military personnel and government workers. Its primary strategy involved spoofed apps that allowed attackers to steal sensitive data and monitor activities.

Now, with its enhanced capabilities and broader distribution methods, the RAT is a much larger threat, affecting a wider range of users. No one is safe from this ever-evolving spyware, from private citizens to high-risk professionals.

Social media icons with number of notifications in each displayed on a phone screen

PJobRAT’s New Tactics? Abusing Legit Apps

PJobRAT has evolved its approach, now cleverly embedding itself in legitimate-looking apps. Unlike when it relied solely on fake apps, the RAT now disguises itself within popular, seemingly harmless utilities.

This strategy helps it slip past user awareness, making detection even harder. As attackers refine their methods, the RAT continues to spread unnoticed, with its ability to disguise itself within everyday apps becoming a major concern for unsuspecting users.

Sophos brand logo

Sophos Stated, This RAT Hid for Nearly 2 Years?

Cybersecurity firm Sophos, trusted by governments and major corporations, revealed that PJobRAT may have been active for nearly 22 months without detection. That means users were unknowingly exposed for almost two years.

Sophos specializes in tracking advanced threats, and their research confirms how stealthy this RAT has become. With its long shelf life and evolving tricks, PJobRAT isn’t just malware, it’s a long-term spy hiding in your pocket.

smart phone on wooden table

Silent Surveillance via Your Microphone

One of PJobRAT’s most dangerous tricks? It can silently activate your microphone. That means it could be listening to your private conversations, meetings, or calls without any warning.

The app doesn’t show obvious signs, so users never know they’re being recorded. This level of audio surveillance makes the RAT not just a data thief, but a full-blown eavesdropping tool hidden in your phone.

Hackers tracking the car on the computer

Built-In GPS Tracking Pins Your Location?

PJobRAT doesn’t just spy on your files; it knows exactly where you are. The malware uses your phone’s GPS to track your real-time location without your consent. Attackers can map your daily routes, log where you sleep, work, or travel, and even monitor how long you stay in certain places.

It’s not just a privacy risk, it’s a potential safety threat. When your movements are this exposed, you’re not just being watched, you’re being followed. Make sure to turn your location off for apps that ask for permissions for access.

You may not know that Your New Android Might Be Infected. Read this to learn how you can know whether your phones are infected.

Woman using wordpress app in a smart phone while lying

Fake WordPress Sites Spread This RAT

PJobRAT is cleverly spreading through compromised WordPress sites. Cybercriminals hijack these sites to distribute infected apps, tricking victims into downloading them. Many unsuspecting users fall victim because these sites appear legitimate and often rank high in search results.

It’s a reminder that security starts with where you browse. Sideloading apps from unofficial websites remains one of the most common ways for PJobRAT to find its way onto your Android device.

Here you can read about how to Check If Your Phone Was Hacked, to prevent getting hacked.

What do you think about this? Let us know in the comments, and don’t forget to leave a like.

Read More From This Brand:

Don’t forget to follow us for more exclusive content right here on MSN.

If you liked this story, you’ll LOVE our FREE emails. Join today and be the first to get stories like this one.

This content is exclusive for our subscribers.

Get instant FREE access to ALL of our articles.

Was this helpful?
Thumbs UP Thumbs Down
Prev Next
Share this post

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!

Send feedback to ComputerUser



    We appreciate you taking the time to share your feedback about this page with us.

    Whether it's praise for something good, or ideas to improve something that isn't quite right, we're excited to hear from you.