Description

A newly identified Android malware-as-a-service named Cellik has emerged on underground cybercrime forums, enabling threat actors to create malicious versions of legitimate applications from the Google Play Store. Instead of building suspicious standalone malware, attackers can select popular and trusted apps and embed Cellik into them, producing trojanized versions that retain the original app’s interface and functionality. This tactic allows infected apps to appear genuine, significantly increasing the chances that users will install and continue using them without detecting malicious behavior. The reason Cellik is particularly dangerous lies in its extensive capabilities and stealth-focused design. The malware can capture and stream screens in real time, intercept notifications, browse and exfiltrate files, wipe device data, and communicate with attackers through encrypted channels. It also includes hidden browser functionality that abuses stored cookies and an app injection system for credential theft. According to mobile security firm iVerify, Cellik’s integration with the Play Store ecosystem may help it evade detection mechanisms such as Google Play Protect by hiding malicious payloads inside well-known applications, though this claim remains unverified by Google. To reduce risk, Android users should avoid sideloading APK files from untrusted or unofficial sources, even if the app appears familiar. Keeping Play Protect enabled, reviewing app permissions carefully, and watching for abnormal device behavior such as unexpected overlays or data usage are essential. Organizations and individuals should also rely on reputable mobile security solutions and ensure timely system updates to minimize exposure to emerging Android malware threats.