Delete Now! – These 21 Apps With More Than 7 Million Downloads Contains Malware

Researchers found 21 malicious adware apps on Google play that disguised as gaming apps. These apps have adware hidden by design and have anti-uninstall and evasion functions.

The 21 gaming apps in question were found to be downloaded more than eight million. These apps come packed with adware which is a part of the HiddenAds family.

21 Malicious Apps

Generally, adware apps come itself hidden with fun or useful application, this time with the gaming apps that promise to virtually “let your car fly across the road, trees, hills,” but their main motive is to serve ads.

The adware is Potentially Unwanted apps, it also termed as advertising software, it directs you to the malicious websites and collects user information.

Apart from generating revenue they can also secretly include anonymous new toolbars, extensions, and alter the home page.

In this instance “users reported they were targeted with ads promoting the games on YouTube and the cybercriminals targets younger audience,” reads Avast blog post.

Google does its best to protect the play store from malicious apps, but still, the malicious apps keep finding new ways to disguise their true purpose.

“Users need to be vigilant when downloading applications to their phones and are advised to check the applications’ profile, reviews, and to be mindful of extensive device permission requests,” says Jakub Vávra, Threat Analyst at Avast.

Avast reported the findings to Google and all the listed apps from the playstore now.

Here you can find the list of 21 malicious apps if you have any apps installed on your device remove it.

Recommended Mitigation

  • Keep your mobile device up-to-date with the latest software updates from legitimate sources.
  • Keep Google Play Protect on.
  • Do not download mobile apps from unofficial or unauthorized sources. Most legitimate Android apps are available on the Google Play Store.
  • Always apply critical thinking and consider whether you should give a certain app the permissions it requests.
  • When in doubt, check the APK signature and hash in sources like VirusTotal before installing it on your device.
  • Use mobile threat detection solutions for enhanced security.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read:

Hackers Spread Android Malware Via Coronavirus Safety App & Gain Contacts Access to Infect All of Them via SMS

Cookiethief – Android Malware that Gains Root Access to Steal Browser & Facebook App Cookies

Google Play Store Flooding with Spyware, Banking Trojan, Adware Via Games, and Utility Apps

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

5 hours ago

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral to…

5 hours ago

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers, following…

5 hours ago

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted applications,…

5 hours ago

Tycoon 2FA Phishing Kit Uses Advanced Evasion Techniques to Bypass Endpoint Detection Systems

The notorious Tycoon 2FA phishing kit continues its evolution with new strategies designed to slip…

5 hours ago

Hands-On Labs: The Key to Accelerating CMMC 2.0 Compliance

INE Security Highlights How Practical, immersive training environments help defense contractors meet DoD cybersecurity requirements…

9 hours ago