
A brand new Android malware-as-a-service (MaaS) named Cellik is being marketed on underground cybercrime boards providing a strong set of capabilities that embrace the choice to embed it in any app accessible on the Google Play Retailer.
Particularly, attackers can choose apps from Android’s official app retailer and create trojanized variations that seem reliable and hold the true app’s interface and performance.
By offering the anticipated capabilities, Cellik infections can go unnoticed for an extended time. Moreover, the vendor claims that bundling the malware this fashion could assist bypass Play Shield, though that is unconfirmed.
Cell safety agency iVerify found Cellik on underground boards the place it’s provided for $150/month or $900 for lifetime entry.
Cellik capabilities
Cellik is a fully-fledged Android malware that may seize and stream the sufferer’s display screen in actual time, intercept app notifications, browse the filesystem, exfiltrate recordsdata, wipe information, and talk with the command-and-control server by way of an encrypted channel.

Supply: iVerify
The malware additionally contains a hidden browser mode that attackers can use to entry web sites from the contaminated system utilizing the sufferer’s saved cookies.
An app injection system permits attackers to overlay faux login screens or inject malicious code into any app to steal the sufferer’s account credentials.
The listed capabilities additionally embrace the choice to inject payloads onto put in apps, which might make pinpointing the an infection much more tough, as long-trusted apps out of the blue flip rogue.

Supply: iVerify
The spotlight, although, is the Play Retailer integration into Cellik’s APK builder, which permits cybercriminals to browse the shop for apps, choose those they need, and create a malicious variant of them.
“The vendor claims Cellik can bypass Google Play security measures by wrapping its payload in trusted apps, basically disabling Play Shield detection,” explains iVerify.
“Whereas Google Play Shield usually flags unknown or malicious apps, trojans hidden inside in style app packages may slip previous automated evaluations or device-level scanners.”
BleepingComputer has contacted Google to ask if Cellik-bundled apps can certainly evade Play Shield, however a remark wasn’t instantly accessible.
To remain secure, Android customers ought to keep away from sideloading APKs from doubtful websites except they belief the writer, guarantee Play Shield is lively on the system, assessment app permissions, and monitor for uncommon exercise.
Damaged IAM is not simply an IT downside – the impression ripples throughout your entire enterprise.
This sensible information covers why conventional IAM practices fail to maintain up with fashionable calls for, examples of what “good” IAM seems like, and a easy guidelines for constructing a scalable technique.


