Friday, January 31, 2025
HomeAndroidMore Than 50 Malicious Apps With Over 350,000 Installs Found On Google...

More Than 50 Malicious Apps With Over 350,000 Installs Found On Google Play

Published on

SIEM as a Service

Follow Us on Google News

More than 50 malicious apps that designed for kids as coloring apps or games found on Google play has no functionality other than displaying ads.

Mobile security researcher LUKAS STEFANKO identified the malicious app and reported to Google Security team, now most of the apps have been removed and few still available to download.

50 Malicious Apps – Functionality

The functionality of the app is to only display the interstitial ads that cover the entire device screen.

Once these malicious apps installed and launched it displays error and hides from user view and continues to run the background.

Stefanko spotted that one of the apps was even in the trending list, at sixth place in the Educational category. Altogether these malicious apps are downloaded for more than 350,000 times.

All these applications hide after installation from home screen, even if the user tries to remove manually it is a tough job as the app hides between other application changes its name and icon.

Recently a new Android malware spotted that spying users WhatsApp messages and other sensitive data such as browsing history, photos.

Serious checks need to be done about the apps you download, particularly if you’re using an Android operating system.

Because of Android’s open network, apps are more likely to have malware built in, that will harm your phone with no knowledge of it whatsoever.

Common Tips to Catch Fake Android App

  • Look at the publish date. A fake app will have a recent published date.
  • Do a little research about the developer of the app you plan to install.
  • Very important – read all app permissions carefully.

Common Defences On Mobile Threats

  • Give careful consideration to the permission asked for by applications.
  • Download applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

VMware Aria Operations Vulnerabilities Allow Attackers to Perform Admin-Level Actions

VMware has released a critical security advisory, VMSA-2025-0003, addressing multiple vulnerabilities in VMware Aria Operations...

Malware Discovered in Healthcare Patient Monitors, Traced to Chinese IP Address

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory regarding multiple...

Jailbreaking DeepSeek: Researchers Reveal Three New Methods to Override LLM Safety

Researchers at Palo Alto Networks' Unit 42 have revealed a troubling surge in large...

Phorpiex Botnet Distributes LockBit Ransomware Through Compromised Websites

Cybereason Security Services has published a comprehensive threat analysis highlighting the resurgence of the...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

VMware Aria Operations Vulnerabilities Allow Attackers to Perform Admin-Level Actions

VMware has released a critical security advisory, VMSA-2025-0003, addressing multiple vulnerabilities in VMware Aria Operations...

Malware Discovered in Healthcare Patient Monitors, Traced to Chinese IP Address

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory regarding multiple...

Jailbreaking DeepSeek: Researchers Reveal Three New Methods to Override LLM Safety

Researchers at Palo Alto Networks' Unit 42 have revealed a troubling surge in large...