More Than 50 Malicious Apps With Over 350,000 Installs Found On Google Play

More than 50 malicious apps that designed for kids as coloring apps or games found on Google play has no functionality other than displaying ads.

Mobile security researcher LUKAS STEFANKO identified the malicious app and reported to Google Security team, now most of the apps have been removed and few still available to download.

50 Malicious Apps – Functionality

The functionality of the app is to only display the interstitial ads that cover the entire device screen.

Once these malicious apps installed and launched it displays error and hides from user view and continues to run the background.

Stefanko spotted that one of the apps was even in the trending list, at sixth place in the Educational category. Altogether these malicious apps are downloaded for more than 350,000 times.

All these applications hide after installation from home screen, even if the user tries to remove manually it is a tough job as the app hides between other application changes its name and icon.

Recently a new Android malware spotted that spying users WhatsApp messages and other sensitive data such as browsing history, photos.

Serious checks need to be done about the apps you download, particularly if you’re using an Android operating system.

Because of Android’s open network, apps are more likely to have malware built in, that will harm your phone with no knowledge of it whatsoever.

Common Tips to Catch Fake Android App

  • Look at the publish date. A fake app will have a recent published date.
  • Do a little research about the developer of the app you plan to install.
  • Very important – read all app permissions carefully.

Common Defences On Mobile Threats

  • Give careful consideration to the permission asked for by applications.
  • Download applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of the…

10 minutes ago

Microsoft Enhances M365 Bounty Program with New Services & Rewards Up to $27,000

Microsoft has announced updates to its Microsoft 365 (M365) Bug Bounty Program, offering expanded services,…

18 minutes ago

Tata Technologies Hit by Ransomware Attack, Some IT Services Suspended

Tata Technologies, a leading provider of engineering and IT services, has reported a ransomware attack…

1 hour ago

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed…

12 hours ago

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria Stealer,"…

12 hours ago

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass,…

12 hours ago