Cellik Android malware builds malicious versions from Google Play apps
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户的要求是直接写文章描述,不需要以“文章内容总结”或“这篇文章”开头。 首先,我阅读了用户提供的文章。文章主要介绍了一种名为Cellik的新Android恶意软件即服务(MaaS),它在地下网络犯罪论坛上被广告宣传。Cellik可以嵌入到Google Play商店中的任何应用中,生成看起来可信的木马版本,同时保留原应用的界面和功能。这种恶意软件具备多种功能,如实时屏幕捕获、文件窃取、数据擦除等,并且声称可以绕过Google Play Protect的安全检测。 接下来,我需要将这些信息浓缩到100字以内。关键点包括:Cellik是新的Android MaaS,通过地下论坛销售,能够伪装成可信应用,具备多种恶意功能,并声称能绕过Play Protect。 现在,我组织语言:首先说明Cellik是什么,然后提到它的功能和销售方式,最后指出其潜在威胁。 确保语言简洁明了,不使用复杂的术语,同时涵盖所有关键点。 </think> 一种名为Cellik的新Android恶意软件即服务(MaaS)正在地下论坛上销售。它可伪装成可信应用,并具备实时屏幕捕获、文件窃取等功能。卖家声称其可绕过Google Play Protect检测。 2025-12-16 23:0:19 Author: www.bleepingcomputer.com(查看原文) 阅读量:4 收藏

Cellik Android malware builds malicious versions from Google Play apps

A new Android malware-as-a-service (MaaS) named Cellik is being advertised on underground cybercrime forums offering a robust set of capabilities that include the option to embed it in any app available on the Google Play Store.

Specifically, attackers can select apps from Android's official app store and create trojanized versions that appear trustworthy and keep the real app's interface and functionality.

By providing the expected capabilities, Cellik infections can go unnoticed for a longer time. Additionally, the seller claims that bundling the malware this way may help bypass Play Protect, although this is unconfirmed.

Wiz

Mobile security firm iVerify discovered Cellik on underground forums where it is offered for $150/month or $900 for lifetime access.

Cellik capabilities

Cellik is a fully-fledged Android malware that can capture and stream the victim's screen in real time, intercept app notifications, browse the filesystem, exfiltrate files, wipe data, and communicate with the command-and-control server via an encrypted channel.

Live feed of victim's screen
Live feed of the victim's screen
Source: iVerify

The malware also features a hidden browser mode that attackers can use to access websites from the infected device using the victim's stored cookies.

An app injection system allows attackers to overlay fake login screens or inject malicious code into any app to steal the victim's account credentials.

The listed capabilities also include the option to inject payloads onto installed apps, which would make pinpointing the infection even more difficult, as long-trusted apps suddenly turn rogue.

Cellik's hidden browser mode
Cellik's hidden browser mode
Source: iVerify

The highlight, though, is the Play Store integration into Cellik's APK builder, which allows cybercriminals to browse the store for apps, select the ones they want, and create a malicious variant of them.

"The seller claims Cellik can bypass Google Play security features by wrapping its payload in trusted apps, essentially disabling Play Protect detection," explains iVerify.

"While Google Play Protect typically flags unknown or malicious apps, trojans hidden inside popular app packages might slip past automated reviews or device-level scanners."

BleepingComputer has contacted Google to ask if Cellik-bundled apps can indeed evade Play Protect, but a comment wasn't immediately available.

To stay safe, Android users should avoid sideloading APKs from dubious sites unless they trust the publisher, ensure Play Protect is active on the device, review app permissions, and monitor for unusual activity.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/cellik-android-malware-builds-malicious-versions-from-google-play-apps/
如有侵权请联系:admin#unsafe.sh