Thursday, March 28, 2024

More Than 50 Malicious Apps With Over 350,000 Installs Found On Google Play

More than 50 malicious apps that designed for kids as coloring apps or games found on Google play has no functionality other than displaying ads.

Mobile security researcher LUKAS STEFANKO identified the malicious app and reported to Google Security team, now most of the apps have been removed and few still available to download.

50 Malicious Apps – Functionality

The functionality of the app is to only display the interstitial ads that cover the entire device screen.

Once these malicious apps installed and launched it displays error and hides from user view and continues to run the background.

Stefanko spotted that one of the apps was even in the trending list, at sixth place in the Educational category. Altogether these malicious apps are downloaded for more than 350,000 times.

All these applications hide after installation from home screen, even if the user tries to remove manually it is a tough job as the app hides between other application changes its name and icon.

Recently a new Android malware spotted that spying users WhatsApp messages and other sensitive data such as browsing history, photos.

Serious checks need to be done about the apps you download, particularly if you’re using an Android operating system.

Because of Android’s open network, apps are more likely to have malware built in, that will harm your phone with no knowledge of it whatsoever.

Common Tips to Catch Fake Android App

  • Look at the publish date. A fake app will have a recent published date.
  • Do a little research about the developer of the app you plan to install.
  • Very important – read all app permissions carefully.

Common Defences On Mobile Threats

  • Give careful consideration to the permission asked for by applications.
  • Download applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
Website

Latest articles

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles