The emergence of Cellik marks a sophisticated shift in the malware-as-a-service landscape by offering a streamlined way to weaponize legitimate applications. By utilizing an integrated builder that connects directly to the official app store, cybercriminals can select popular programs and wrap them in malicious code. This technique ensures that the infected app continues to operate normally for the user, which significantly extends the period the malware can remain undetected on a mobile device.
Once a device is compromised, the malware provides the attacker with an extensive suite of surveillance and data theft tools. It is capable of streaming the victim's screen in real time, intercepting private notifications, and navigating the internal filesystem to steal sensitive documents. Furthermore, it features a specialized browser mode that uses the victim's own web cookies to access accounts, effectively bypassing many traditional security hurdles.
GET 50% Discount for VPN/ANTIVIRUS SOFTWARE AT 911Cyber - CODE: bit5025
A particularly dangerous aspect of this malware is its advanced injection system, which allows it to target other apps already installed on the phone. Attackers can overlay fraudulent login screens on top of banking or social media applications to harvest credentials directly from the user. Because the infection can hide within long-trusted software, identifying the source of a breach becomes much more difficult for the average user or basic security software.
The developers of Cellik claim their method of bundling payloads within trusted app packages can successfully disable or evade Google Play Protect. While these claims of bypassing official security layers are still being investigated by security experts, the potential for trojanized apps to slip past automated scanners remains a significant concern. This highlights a growing vulnerability where the reputation of a legitimate app is used as a shield for malicious activity.
To mitigate these risks, mobile users are advised to be extremely cautious about where they source their software and to avoid manual installations from unverified websites. Keeping system security features active and regularly auditing app permissions can help identify unusual behavior. Monitoring for sudden drops in battery life or unexpected data usage is also recommended as these are often the only visible signs that a hidden process is running in the background.
Source: Cellik Android Malware Builds Malicious Copies Of Legit Google Play Applications



