Friday, April 18, 2025
HomeAndroidMore Than 50 Malicious Apps With Over 350,000 Installs Found On Google...

More Than 50 Malicious Apps With Over 350,000 Installs Found On Google Play

Published on

SIEM as a Service

Follow Us on Google News

More than 50 malicious apps that designed for kids as coloring apps or games found on Google play has no functionality other than displaying ads.

Mobile security researcher LUKAS STEFANKO identified the malicious app and reported to Google Security team, now most of the apps have been removed and few still available to download.

50 Malicious Apps – Functionality

The functionality of the app is to only display the interstitial ads that cover the entire device screen.

- Advertisement - Google News

Once these malicious apps installed and launched it displays error and hides from user view and continues to run the background.

Stefanko spotted that one of the apps was even in the trending list, at sixth place in the Educational category. Altogether these malicious apps are downloaded for more than 350,000 times.

All these applications hide after installation from home screen, even if the user tries to remove manually it is a tough job as the app hides between other application changes its name and icon.

Recently a new Android malware spotted that spying users WhatsApp messages and other sensitive data such as browsing history, photos.

Serious checks need to be done about the apps you download, particularly if you’re using an Android operating system.

Because of Android’s open network, apps are more likely to have malware built in, that will harm your phone with no knowledge of it whatsoever.

Common Tips to Catch Fake Android App

  • Look at the publish date. A fake app will have a recent published date.
  • Do a little research about the developer of the app you plan to install.
  • Very important – read all app permissions carefully.

Common Defences On Mobile Threats

  • Give careful consideration to the permission asked for by applications.
  • Download applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...