Article Details
Scrape Timestamp (UTC): 2025-12-16 23:00:34.229
Original Article Text
Click to Toggle View
Cellik Android malware builds malicious versions from Google Play apps. A new Android malware-as-a-service (MaaS) named Cellik is being advertised on underground cybercrime forums offering a robust set of capabilities that include the option to embed it in any app available on the Google Play Store. Specifically, attackers can select apps from Android's official app store and create trojanized versions that appear trustworthy and keep the real app's interface and functionality. By providing the expected capabilities, Cellik infections can go unnoticed for a longer time. Additionally, the seller claims that bundling the malware this way may help bypass Play Protect, although this is unconfirmed. Mobile security firm iVerify discovered Cellik on underground forums where it is offered for $150/month or $900 for lifetime access. Cellik capabilities Cellik is a fully-fledged Android malware that can capture and stream the victim's screen in real time, intercept app notifications, browse the filesystem, exfiltrate files, wipe data, and communicate with the command-and-control server via an encrypted channel. The malware also features a hidden browser mode that attackers can use to access websites from the infected device using the victim's stored cookies. An app injection system allows attackers to overlay fake login screens or inject malicious code into any app to steal the victim's account credentials. The listed capabilities also include the option to inject payloads onto installed apps, which would make pinpointing the infection even more difficult, as long-trusted apps suddenly turn rogue. The highlight, though, is the Play Store integration into Cellik's APK builder, which allows cybercriminals to browse the store for apps, select the ones they want, and create a malicious variant of them. "The seller claims Cellik can bypass Google Play security features by wrapping its payload in trusted apps, essentially disabling Play Protect detection," explains iVerify. "While Google Play Protect typically flags unknown or malicious apps, trojans hidden inside popular app packages might slip past automated reviews or device-level scanners." BleepingComputer has contacted Google to ask if Cellik-bundled apps can indeed evade Play Protect, but a comment wasn't immediately available. To stay safe, Android users should avoid sideloading APKs from dubious sites unless they trust the publisher, ensure Play Protect is active on the device, review app permissions, and monitor for unusual activity. Break down IAM silos like Bitpanda, KnowBe4, and PathAI Broken IAM isn't just an IT problem - the impact ripples across your whole business. This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.
Daily Brief Summary
Cellik, a new Android malware-as-a-service, is being sold on cybercrime forums, enabling the creation of trojanized versions of apps from the Google Play Store.
This malware maintains the original app's interface and functionality, allowing it to remain undetected longer by users and potentially bypassing Play Protect security.
Cellik is priced at $150 per month or $900 for lifetime access, offering capabilities like real-time screen capture, file exfiltration, and encrypted command-and-control communication.
The malware can inject fake login screens and malicious code into apps, posing a significant risk for credential theft and data breaches.
A key feature is its ability to integrate with Google Play, allowing attackers to select apps and create malicious variants, potentially evading automated security reviews.
Android users are advised to avoid sideloading APKs from untrusted sources, ensure Play Protect is enabled, and regularly review app permissions and activity for anomalies.
Google's response to whether Cellik can evade Play Protect is pending, highlighting ongoing challenges in securing app ecosystems against sophisticated threats.