Wednesday, May 7, 2025
HomeAndroidHackers Uploaded 130 Malicious Apps on Google Play Store to Generate Illegal...

Hackers Uploaded 130 Malicious Apps on Google Play Store to Generate Illegal Revenue

Published on

SIEM as a Service

Follow Us on Google News

Cyber Criminals uploaded around 130 malicious Android apps on Google play store that mimics as various well-known applications to generate illegal revenue by promoting paid mobile services.

Hackers distributing malicious trojan file as an official application on the “Eldorado” trade network via Google Play store using other software.

In this case, researchers uncovered two modified version of  Trojan from Google Play which displays annoying ads and malicious web pages to paid mobile services.

Almost 130 apps were detected that has developed by 44 developers and the criminals adding new malicious apps every day to target millions of Android users.
- Advertisement - Google News

These detected malicious program which including many modified version of Trojan families that infect the victims mobile using various social engineering technique and malvertising campaign.

Also, it posed as the official programs of bookmaker companies, including “Olymp”, “Most bet”, “Fonbet”, “Liga stavok”, “1xBet, “Winline”, and others.

Two Instance Trojan Families Uploaded on Google Play

First one name as Android.Click.265.origin that used to download the mobile version of “Eldorado” online store on its window but during the running time it performed several malicious functions.

Once it installed on to the victims mobile then its shows various annoying ads leads to open users to access the paid mobile services and it also automatically clicked the subscription confirmation button on the opened webpage.

Also, the Trojan can load websites with premium content depending on the traffic distribution system (TDS) parameters of the C&C servers. So ever time victim’s mobile number is charged for using a high-priced service every day.

Another Trojan in the same list used for fraudulent premium services subscribing Android device owners.

According to Dr. Web Researchers, This Trojan opens one of the phishing websites where a user is invited to download a well-known program or to receive a reward. A potential victim is asked to provide their mobile number, which is supposedly required to receive a confirmation code.

“In reality, however, this code is required to confirm a subscription to a paid service. If an infected device uses a mobile network to connect to the Internet, an Android device owner is subscribed to a premium service automatically after the phone number has been entered on the fraudulent website.”

Once the malicious program launched, it connected to C&C server which downloads a website, also the Trojans request a malicious online portals links that leads to download other malicious programs.

“To take money from mobile device owners or to get other advantages, cybercriminals use various tricks and invent new scam schemes It is necessary to pay attention to the developer’s name, publication date, and reviews from other users. These simple measures can decrease the risk that the mobile device will become infected, Dr web said.”

Also Read

Newly Discovered Android Malware Stealing Data from Messaging Applications WhatsApp, Viber, Facebook

WiFi Broadcasts in All Version of Android OS Leaking Sensitive Data Including IP Addresses, BSSID, WiFi Network Name

Beware of Dangerous Android Triout Malware That Records Phone Calls, Videos and Steals Pictures

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

SpyCloud, the leading identity threat protection company, today released an analysis of nearly 6...

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Lampion Banking Malware Uses ClickFix Lures to Steal Banking Credentials

Unit 42 researchers at Palo Alto Networks, a highly targeted malicious campaign orchestrated by...

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations,...

Over 2,800 Hacked Websites Targeting MacOS Users with AMOS Stealer Malware

Cybersecurity researcher has uncovered a massive malware campaign targeting MacOS users through approximately 2,800...