Friday, March 1, 2024

More Than 50 Malicious Apps With Over 350,000 Installs Found On Google Play

More than 50 malicious apps that designed for kids as coloring apps or games found on Google play has no functionality other than displaying ads.

Mobile security researcher LUKAS STEFANKO identified the malicious app and reported to Google Security team, now most of the apps have been removed and few still available to download.

50 Malicious Apps – Functionality

The functionality of the app is to only display the interstitial ads that cover the entire device screen.

Once these malicious apps installed and launched it displays error and hides from user view and continues to run the background.

Stefanko spotted that one of the apps was even in the trending list, at sixth place in the Educational category. Altogether these malicious apps are downloaded for more than 350,000 times.

All these applications hide after installation from home screen, even if the user tries to remove manually it is a tough job as the app hides between other application changes its name and icon.

Recently a new Android malware spotted that spying users WhatsApp messages and other sensitive data such as browsing history, photos.

Serious checks need to be done about the apps you download, particularly if you’re using an Android operating system.

Because of Android’s open network, apps are more likely to have malware built in, that will harm your phone with no knowledge of it whatsoever.

Common Tips to Catch Fake Android App

  • Look at the publish date. A fake app will have a recent published date.
  • Do a little research about the developer of the app you plan to install.
  • Very important – read all app permissions carefully.

Common Defences On Mobile Threats

  • Give careful consideration to the permission asked for by applications.
  • Download applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
Website

Latest articles

Golden Corral restaurant chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...

Hackers Hijack Anycubic 3D Printers to Display Warning Messages

Anycubic 3D printer owners have been caught off guard by a series of unauthorized...

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

Stellar Cyber, the innovator of Open XDR, today announced that RSM US – the leading provider...

Biden Crack Down Sale of Americans’ Personal Data to China & Russia

To safeguard the privacy and security of American citizens, President Joe Biden has issued...

Kali Linux 2024.1 Released – What’s New

Kali Linux recently released version 2024.1, the first release of the year 2024, with...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles