2026 Futuriom 50: Highlights →Explore

Executive Summary

In December 2025, cybersecurity researchers identified a new Android malware-as-a-service (MaaS) dubbed Cellik that enables cybercriminals to create malicious variants of popular Google Play Store apps. Distributed via underground forums, Cellik’s service allows threat actors to select legitimate apps, inject sophisticated malware, and maintain original app functionality, thereby bypassing typical user suspicion and potentially evading Google Play Protect. Cellik's features include real-time screen streaming, notification interception, filesystem browsing, data exfiltration, device wiping, and encrypted command-and-control communications. Attackers can also overlay fake login screens, inject malicious payloads into trusted apps, and exploit a hidden browser to steal credentials using stored cookies from infected devices.

The emergence of Cellik signals an evolution in Android threat tooling, where MaaS kits empower less skilled actors to launch advanced attacks. This development heightens risks for organizations subject to mobile threats as attackers embrace more modular and evasive tactics, underlining the urgent need for advanced mobile security controls and proactive user education.

Why This Matters Now

Cellik demonstrates how attackers can exploit trust in official app stores by deploying sophisticated malware hidden within legitimate app interfaces. Its malware-as-a-service offering lowers the barrier to entry for cybercriminals and reflects a growing trend in modular, rapidly-adaptable threats targeting mobile ecosystems—making vigilant security and timely detection more urgent than ever.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

Cellik enables attackers to embed malware into legitimate Google Play apps, maintaining the original look and functionality, making detection difficult for both users and automated security measures like Play Protect.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Applying CNSF and Zero Trust controls—such as microsegmentation, egress policy enforcement, east-west traffic security, inline threat detection, and end-to-end encryption—could have limited malware movement, blocked C2 communication, detected anomalous post-compromise behaviors, and prevented data exfiltration even after device compromise.

Initial Compromise

Control: Multicloud Visibility & Control

Mitigation: Early detection of anomalous app installation or traffic could have triggered alerts.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Limited unauthorized inter-app and identity-based access to sensitive data.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Detection and containment of unauthorized internal workload-to-workload communications.

Command & Control

Control: Inline IPS (Suricata)

Mitigation: Detection and blocking of known malicious or suspicious C2 traffic patterns.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Prevention of unauthorized outbound data transfers or destination access.

Impact (Mitigations)

Rapid detection of destructive actions enables timely response and limits harm.

Impact at a Glance

Affected Business Functions

  • Mobile Banking
  • E-commerce Transactions
  • Corporate Email Access
Operational Disruption

Estimated downtime: 5 days

Financial Impact

Estimated loss: $500,000

Data Exposure

Potential exposure of sensitive user credentials, financial information, and personal data due to unauthorized access facilitated by the malware.

Recommended Actions

  • Harden app supply chains and continuously monitor for unauthorized or trojanized deployments across hybrid/multicloud environments.
  • Enforce granular Zero Trust segmentation and least privilege to isolate workloads, restrict app permissions, and contain app-to-app movement.
  • Implement egress filtering, DNS/FQDN controls, and east-west inspection to proactively identify and block C2 and exfiltration attempts even in encrypted traffic.
  • Leverage inline threat detection, baselining, and anomaly response to surface suspicious activity such as unauthorized overlays, data wipes, or session hijacking.
  • Centralize visibility and automate incident response actions to enable rapid containment and reduce dwell time across cloud-native and endpoint environments.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image