Sunday, May 18, 2025
HomeAndroid35 Malware Android Apps With over 2 million Installation Found on the...

35 Malware Android Apps With over 2 million Installation Found on the Google Play Store

Published on

SIEM as a Service

Follow Us on Google News

It has become increasingly common for threat actors to use Google Play Store to attempt to get malicious applications listed there in recent years. In terms of trafficked Android app sources in the world, Google Play Store is considered the most popular.

On the Google Play Store, a new collection of 35 Android apps that are malicious in nature and display unwanted ads has been discovered by Bitdefender.

More than 2 million times, these apps have been downloaded to the mobile devices of victims worldwide. An analysis based on the behavior of the app, which was performed in real-time by Bitdefender researchers, revealed the potentially malicious apps. 

- Advertisement - Google News

In the real-time detection of potential threats, this is certainly one of the most efficient methods available. There are a lot of apps out there that pretend to be specialized applications and use these tactics to entice users to install them. 

However, they often change their names and icons shortly after being installed, making uninstalling and finding them more difficult. This then leads to the malicious apps being used by users to serve intrusive advertisements by exploiting the WebView technology

As a result, their operators are able to generate fraudulent impressions and advertising revenues for profit. As these apps utilize their own framework for loading the ads, there is a possibility that some infected devices could be infected with additional malicious payloads.

Various Methods of Hiding

In addition to the implementation of multiple methods of hiding on Android devices, adware apps may also receive updates in order to make hiding on Android devices an easier process.

As soon as the apps have been installed, the icons are usually changed to a cog, and they are renamed to ‘Settings’. This is done so that they cannot be detected and deleted.

The malware application is launched with a size of 0 when the user clicks on the icon as it hides from view. In order to trick users into believing they have launched the correct app, the malware launches the legitimate Settings menu as a disguise.

The apps may sometimes appear as if they are part of a Motorola, Oppo, or Samsung system application with the look and feel of these brands.

A considerable amount of code obfuscation and encryption is also employed in the malicious apps, which are designed to thwart reverse engineering attempts. This is achieved by encrypting two DEX files that contain the main Java payload.

Alternatively, apps can be excluded from the list of recent apps so as to remain hidden from the user. Consequently, exposing active processes will not reveal them if they are running in the background.

Recommendation

Here below, we have mentioned all the recommendations offered:-

  • Make sure you do not install apps that are not really necessary for you.
  • If you are no longer using an app, make sure you delete it.
  • A well-established app that has few or no reviews and a large number of downloads should be avoided.
  • Apps requesting special permissions, such as Drawing over apps or Accessibility, should be avoided.
  • Make sure you do not install any apps that request permissions that are unrelated to the functionality they claim to offer.
  • Install a security solution that is capable of detecting malicious activity in the background.

Sponsored: Rise of Remote Workers: A Checklist for Securing Your Network – Download Free White paper

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Printer Company Distributes Malicious Drivers Infected with XRed Malware

Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious...

Frigidstealer Malware Targets macOS Users to Harvest Login Credentials

An macOS users, a new information-stealing malware dubbed FrigidStealer has emerged as a formidable...

SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign

A meticulously orchestrated phishing campaign targeting Kuwait's fisheries, telecommunications, and insurance sectors has been...