
A brand new Android malware-as-a-service (MaaS) named Cellik is being marketed on underground cybercrime boards providing a strong set of capabilities that embody the choice to embed it in any app accessible on the Google Play Retailer.
Particularly, attackers can choose apps from Android’s official app retailer and create trojanized variations that seem reliable and maintain the true app’s interface and performance.
By offering the anticipated capabilities, Cellik infections can go unnoticed for an extended time. Moreover, the vendor claims that bundling the malware this manner could assist bypass Play Defend, though that is unconfirmed.
Cellular safety agency iVerify found Cellik on underground boards the place it’s provided for $150/month or $900 for lifetime entry.
Cellik capabilities
Cellik is a fully-fledged Android malware that may seize and stream the sufferer’s display screen in actual time, intercept app notifications, browse the filesystem, exfiltrate information, wipe knowledge, and talk with the command-and-control server by way of an encrypted channel.

Supply: iVerify
The malware additionally includes a hidden browser mode that attackers can use to entry web sites from the contaminated gadget utilizing the sufferer’s saved cookies.
An app injection system permits attackers to overlay pretend login screens or inject malicious code into any app to steal the sufferer’s account credentials.
The listed capabilities additionally embody the choice to inject payloads onto put in apps, which might make pinpointing the an infection much more tough, as long-trusted apps abruptly flip rogue.

Supply: iVerify
The spotlight, although, is the Play Retailer integration into Cellik’s APK builder, which permits cybercriminals to browse the shop for apps, choose those they need, and create a malicious variant of them.
“The vendor claims Cellik can bypass Google Play safety features by wrapping its payload in trusted apps, primarily disabling Play Defend detection,” explains iVerify.
“Whereas Google Play Defend sometimes flags unknown or malicious apps, trojans hidden inside widespread app packages would possibly slip previous automated evaluations or device-level scanners.”
BleepingComputer has contacted Google to ask if Cellik-bundled apps can certainly evade Play Defend, however a remark wasn’t instantly accessible.
To remain protected, Android customers ought to keep away from sideloading APKs from doubtful websites until they belief the writer, guarantee Play Defend is lively on the gadget, evaluate app permissions, and monitor for uncommon exercise.
Damaged IAM is not simply an IT downside – the impression ripples throughout your complete enterprise.
This sensible information covers why conventional IAM practices fail to maintain up with trendy calls for, examples of what “good” IAM appears to be like like, and a easy guidelines for constructing a scalable technique.

