A newly identified Android malware-as-a-service named Cellik has emerged on underground cybercrime forums, enabling threat actors to create malicious versions of legitimate applications from the Google Play Store. Instead of building suspicious standalone malware, attackers can select popular and trusted apps and embed Cellik into them, producing trojanized versions that retain the original app’s interface and functionality. This tactic allows infected apps to appear genuine, significantly increasing the chances that users will install and continue using them without detecting malicious behavior. The reason Cellik is particularly dangerous lies in its extensive capabilities and stealth-focused design. The malware can capture and stream screens in real time, intercept notifications, browse and exfiltrate files, wipe device data, and communicate with attackers through encrypted channels. It also includes hidden browser functionality that abuses stored cookies and an app injection system for credential theft. According to mobile security firm iVerify, Cellik’s integration with the Play Store ecosystem may help it evade detection mechanisms such as Google Play Protect by hiding malicious payloads inside well-known applications, though this claim remains unverified by Google. To reduce risk, Android users should avoid sideloading APK files from untrusted or unofficial sources, even if the app appears familiar. Keeping Play Protect enabled, reviewing app permissions carefully, and watching for abnormal device behavior such as unexpected overlays or data usage are essential. Organizations and individuals should also rely on reputable mobile security solutions and ensure timely system updates to minimize exposure to emerging Android malware threats.
PayPal has disclosed a data breach affecting customer accounts after attackers leveraged compromised credentials to gain unauthorized access. The incident did not stem from a vulne...
Large language models (LLMs) are increasingly being used to create passwords, but recent analysis reveals that the results are far less secure than they seem. While a password such...
Security researchers from OX Security have identified three critical vulnerabilities affecting widely used Visual Studio Code extensions, collectively downloaded more than 128 mill...