Monday, April 28, 2025
HomeAndroid13 Malicious Apps in Google Play With More than 560,000+ Installs

13 Malicious Apps in Google Play With More than 560,000+ Installs

Published on

SIEM as a Service

Follow Us on Google News

Malicious apps in Google play that tricks the user to download additional apps in the background that display ads in the infected device.

Security researcher Lukas Stefanko discovered the 13 such malicious in Google play with more than 560,000+ installs. Among the identified 13 apps, 2 apps are in trending list.

Malicious apps in Google play

The main purpose of these malicious apps is to download and install additional apps that display annoying ads in the victim devices.

- Advertisement - Google News

Once these apps launched it hides icon in the device and downloads other apps in the background and request the user’s to install it.

According to Stefanko analysis on downloaded Game center apk file, the app will hide after the launch and then display ads once the device is unlocked.

After installing the Game center asks for full network permission to monitor the connections running and to view all the connection from the device.

All those 13 files are empty shells and they are uploaded to Google play to trick the victims in installing the final payload Game Center.

Stefanko reported the malicious app to the Google security team and all the apps has been removed from the play store now.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Beware!! New Android Malware That Can Read Your WhatsApp Messages & Take Screen Shots

Newly Discovered Android Malware Stealing Data from Messaging Applications WhatsApp, Viber, Facebook

Dangerous Android Malware that Steals Banking Credentials, Call Forwarding, Keylogging, and Ransomware Activities

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...