Wednesday, February 26, 2025
HomeAndroidBeware!! 25 Malicious Apps with Over 2.1 Million Downloads Found in the...

Beware!! 25 Malicious Apps with Over 2.1 Million Downloads Found in the Google Play

Published on

SIEM as a Service

Follow Us on Google News

Researchers uncovered several malicious apps in the Google play poses as photo utility app and a fashion app. These malicious altogether found downloaded more than 2.1 million times.

All the 25 malicious apps are published form 22 different developer accounts, but all the apps have similar structure and content. This indicates the developers of the app are from the same group and developed the script from the same code base.

Malware Installation

Once the app installed it displays an icon on the screen, if opened then it downloads a remote configuration file from third-party service without user consent. The configuration file contains settings that “can toggle the app’s icon-hiding behavior, as well as other advertisement-related settings.”

The downloaded malware extracts the settings and applies to the app. The malware code contains keywords “such as “app_hideIcon” in the case of the icon-hiding feature, are encoded and encrypted. To avoid detection by antivirus scanners.”

Once the app icon got hidden from the device screen it starts displaying advertisements, these advertisements continue to show even the app is closed.

“Full-screen advertisements are displayed at random intervals with no app title registered in the advertisement window, so users have no way of knowing which app is responsible for the behavior.”

These illicit apps generate revenue to its developers by infecting the user’s device, they generate ads randomly which makes hard for end-users to determine which app is responsible for it.

To play more stealthy, one developer published two identical apps in the store one is the clean and the second one packed with malicious code. In another scenario, they created a malicious copy of the trending apps.

“Unlike the previously hidden app malware we discovered, this batch does not have the icon-hiding function hardcoded in the APK. Instead, the switch is controlled remotely via the downloaded configuration file, allowing the malware developer to evade Google Play’s rigorous security testing.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

Hackers Exploiting Cisco Small Business Routers RCE Vulnerability Deploying Webshell

A critical remote code execution (RCE) vulnerability, CVE-2023-20118, affecting Cisco Small Business Routers, has...

Malicious npm Package Targets Developers for Supply Chain Attack

The Socket Research Team has uncovered a malicious npm package@ton-wallet/create designed to steal sensitive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

TgToxic Android Malware Updated it’s Features to Steal Login Credentials

The TgToxic Android malware, initially discovered in July 2022, has undergone significant updates, enhancing...

New Auto-Color Malware Attacking Linux Devices to Gain Full Remote Access

Researchers at Palo Alto Networks have identified a new Linux malware, dubbed "Auto-Color," that...

Lumma Stealer Malware Delivered Through Weaponized Files Disguised as Videos

The Lumma Stealer malware, a sophisticated infostealer, is being actively distributed through malicious files...