Tuesday, March 4, 2025
HomeAndroidGoogle Blocks 2.28 Million Malicious Apps from Play Store in Security Crackdown

Google Blocks 2.28 Million Malicious Apps from Play Store in Security Crackdown

Published on

SIEM as a Service

Follow Us on Google News

In a continued commitment to enhancing user safety and trust, Google has outlined significant strides made in 2023 to mitigate malicious activities across the Android ecosystem.

Guided by the SAFE principles Safeguard Users, Advocate for Developer Protection, Foster Responsible Innovation, and Evolve Platform Defenses, the company has implemented new strategies, reinforced policies, and adopted advanced technologies to stay ahead of emerging security threats.

One of the most notable achievements was preventing the publication of 2.28 million policy-violating apps on Google Play, achieved through enhanced developer review processes and advanced machine learning-driven app evaluations.

Google also banned 333,000 malicious developer accounts, attributed to confirmed malware and serial policy violations.

Furthermore, nearly 200,000 app submissions were either rejected or modified to ensure stricter compliance with sensitive permission policies, such as background location access and SMS usage.

To fortify user privacy at scale, Google collaborated with Software Development Kit (SDK) providers, limiting sensitive data sharing for over 31 SDKs affecting more than 790,000 apps.

The Google Play SDK Index was also expanded to encompass nearly 6 million apps, enabling developers to make informed SDK choices and reduce integration risks.

Developer Accountability

Google took a significant step by restructuring the App Defense Alliance (ADA) in partnership with Microsoft and Meta under the Joint Development Foundation.

This initiative aims to drive industry-wide adherence to app security best practices.

Meanwhile, transparency efforts were bolstered with new Play Store labeling for VPN apps that undergo independent security reviews under the Mobile App Security Assessment (MASA) framework, helping users identify apps prioritizing privacy and security.

To counter threats beyond the Play Store, Google Play Protect further enhanced its real-time code-level scanning capabilities.

Powered by machine learning algorithms analyzing extensive behavioral signals, these measures identified over 5 million new malicious apps distributed outside the Play Store.

Google also introduced more stringent developer requirements to improve app quality and accountability.

New guidelines now mandate testing for new developers before apps are made publicly available.

Developers are also required to provide enhanced identity verification, such as D-U-N-S numbers for organizations, and detailed profiles in the “About the Developer” section.

Additionally, apps enabling account creation must now feature easy-to-access account and data deletion options within the app and online, ensuring users’ control over their personal information.

In 2024, Google plans to escalate efforts against non-compliance by removing apps that fail to disclose transparent privacy practices.

The company has also filed a federal lawsuit against individuals responsible for fraudulent crypto exchange apps on Play, signaling its intent to hold malicious actors accountable.

With a robust roadmap for improving Android security, privacy, and user control, Google remains steadfast in its mission to provide a safer, more reliable platform for developers and users worldwide.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...