Saturday, December 28, 2024
HomeAdware85 Malicious Photography and Gaming Adware Apps Installed Over 8 Million Times...

85 Malicious Photography and Gaming Adware Apps Installed Over 8 Million Times From Play Store

Published on

SIEM as a Service

Researchers discovered nearly 85 malicious adware apps in Google play store that intended to upload for delivering adware and monetize from affected Android devices.

These Fraudulent adware apps were installed over 8 million times from the Google play store, and the malicious ads displaying in the affected phone are very difficult to close.

Past two-years adware is playing a vital role in cybercrime to cost businesses huge financial losses, and it also targets the millions of individual Android users.

- Advertisement - SIEM as a Service

These malicious app developers are employing a unique and sophisticated technique to evade the detection based on user behaviors.

Researchers discovered these 85 adware apps mostly under photography and gaming apps since these categories are very attractive for Android users.

Adware Infection Process

In order to monitor user behavior and presence, the app is recording the 2 ( “installTime”, “network time” ) different timestamps by abusing a publicly available and legitimate RESTful API.

Soon after it registers an Android component known as Broadcast Receiver that helps to monitor the user behavior after a device is woken up.

Every time the user unlocks the phone, adware keeps on performing the several checks by comparing the current time with a timestamp.

After 30 minutes from the installation, the adware app icon and create a shortcut on the device’s home screen without making any different and unusual appearance.

Adware app shortcut being created and displayed

Attackers using this kindly of a method for their malicious app from being uninstalled by dragging and dropping its icon to the Uninstall section of the screen.

Displaying The Ads

Adware app registers another broadcast receiver to check if the victims unlocked the mobile. The advertisements will be displayed on the screen once it confirmed that the device is unlocked.

According to Trend Micro research, It also uses installTime and networkInstallTime to identify how long it has been installed on the device. Apart from that, it also checks the last advertisement to make sure that it doesn’t show the same ad too frequently.

 full-screen advertisements

Ads are shown in the full screen of the mobile and forcefully view the whole duration of the ad before being able to close it and prevent to go back to access other application until the ad gets automatically closed.

All the malicious adware apps are reported to Google, and the adware-embedded apps are no longer on the Play store.

You can check here the Top 5 Best Adware Removal Tool to Block Annoying Ads in your mobile and computer.

Sponsored:  – Manage all the Endpoint networks from a single Console.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to...

Security Risk Advisors Announces Launch of VECTR Enterprise Edition

Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition, a premium version...

4 Leading Methods of Increasing Business Efficiency 

The more efficient your core business operations, the more motivated and productive your employees...