Tuesday, April 16, 2024

222,200 Users Affected by 15 Malicious Android Wallpaper Apps From Google Play Store

Security researchers discovered 15 malicious wallpaper apps that running Ad Fraud Scheme from Google play store and current these apps downloaded 222,200 Android users.

Cybercriminals frequently using Play store to upload malicious apps that often delivering malware and committing ads frauds.

Italy, Taiwan, the United States, Germany and Indonesia with the most infections records by this malicious wallpaper apps.

These Android apps are providing attractive wallpapers that contain highest reviews which is identified as fake review to gain the more trust from users.

Android Malicious Wallpaper Apps Infection process

Initially, Once user downloaded the app, it will decode the Command & control server address for the configuration process and the complete process running in background so it hide from the user.

After the app launched an HTTP GET request is communicated to the C&C for a JSON-formatted list.

According to Trend Micro “The apps then get the advertising ID from Google Play Services the and replace some parameters in the URL, ANDROID_ID with the advertising ID, replace BUNDLE_ID with the fraudulent app’s package name, replace IP with the infected device’s current IP, and more. After replacement, the URL the according to the type. “

Once URL loads, apps begin to simulate clicks on the ad page The cybercriminals profit through the parameters’ value replacement. IDs provided by Google for Android developers such as the advertising ID, advertiser ID, and device ID are anonymous identifiers specific to users to monetize their apps. Researchers said.

Related Read

Top 10 Best Ways To Secure Your Computer from Cyber Attacks

Most Difficult Security Challenges for CxO (Chief x Officers) During the Cyber Attack


Website

Latest articles

Hacker Customize LockBit 3.0 Ransomware to Attack Orgs Worldwide

Cybersecurity researchers at Kaspersky have uncovered evidence that cybercriminal groups are customizing the virulent...

Microsoft .NET, .NET Framework, & Visual Studio Vulnerable To RCE Attacks

A new remote code execution vulnerability has been identified to be affecting multiple Microsoft...

LightSpy Hackers Indian Apple Device Users to Steal Sensitive Data

The revival of the LightSpy malware campaign has been observed, focusing on Indian Apple...

LightSpy Malware Attacking Android and iOS Users

A new malware known as LightSpy has been targeting Android and iOS users.This sophisticated...

This Startup Aims To Simplify End-to-End Cybersecurity, So Anyone Can Do It

The Web3 movement is going from strength to strength with every day that passes....

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles