Thursday, March 28, 2024

Delete Now! – These 21 Apps With More Than 7 Million Downloads Contains Malware

Researchers found 21 malicious adware apps on Google play that disguised as gaming apps. These apps have adware hidden by design and have anti-uninstall and evasion functions.

The 21 gaming apps in question were found to be downloaded more than eight million. These apps come packed with adware which is a part of the HiddenAds family.

21 Malicious Apps

Generally, adware apps come itself hidden with fun or useful application, this time with the gaming apps that promise to virtually “let your car fly across the road, trees, hills,” but their main motive is to serve ads.

The adware is Potentially Unwanted apps, it also termed as advertising software, it directs you to the malicious websites and collects user information.

Apart from generating revenue they can also secretly include anonymous new toolbars, extensions, and alter the home page.

In this instance “users reported they were targeted with ads promoting the games on YouTube and the cybercriminals targets younger audience,” reads Avast blog post.

Google does its best to protect the play store from malicious apps, but still, the malicious apps keep finding new ways to disguise their true purpose.

“Users need to be vigilant when downloading applications to their phones and are advised to check the applications’ profile, reviews, and to be mindful of extensive device permission requests,” says Jakub Vávra, Threat Analyst at Avast.

Avast reported the findings to Google and all the listed apps from the playstore now.

Here you can find the list of 21 malicious apps if you have any apps installed on your device remove it.

Recommended Mitigation

  • Keep your mobile device up-to-date with the latest software updates from legitimate sources.
  • Keep Google Play Protect on.
  • Do not download mobile apps from unofficial or unauthorized sources. Most legitimate Android apps are available on the Google Play Store.
  • Always apply critical thinking and consider whether you should give a certain app the permissions it requests.
  • When in doubt, check the APK signature and hash in sources like VirusTotal before installing it on your device.
  • Use mobile threat detection solutions for enhanced security.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read:

Hackers Spread Android Malware Via Coronavirus Safety App & Gain Contacts Access to Infect All of Them via SMS

Cookiethief – Android Malware that Gains Root Access to Steal Browser & Facebook App Cookies

Google Play Store Flooding with Spyware, Banking Trojan, Adware Via Games, and Utility Apps

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles