Monday, April 7, 2025
HomeAndroidBeware!! 25 Malicious Apps with Over 2.1 Million Downloads Found in the...

Beware!! 25 Malicious Apps with Over 2.1 Million Downloads Found in the Google Play

Published on

SIEM as a Service

Follow Us on Google News

Researchers uncovered several malicious apps in the Google play poses as photo utility app and a fashion app. These malicious altogether found downloaded more than 2.1 million times.

All the 25 malicious apps are published form 22 different developer accounts, but all the apps have similar structure and content. This indicates the developers of the app are from the same group and developed the script from the same code base.

Malware Installation

Once the app installed it displays an icon on the screen, if opened then it downloads a remote configuration file from third-party service without user consent. The configuration file contains settings that “can toggle the app’s icon-hiding behavior, as well as other advertisement-related settings.”

- Advertisement - Google News

The downloaded malware extracts the settings and applies to the app. The malware code contains keywords “such as “app_hideIcon” in the case of the icon-hiding feature, are encoded and encrypted. To avoid detection by antivirus scanners.”

Once the app icon got hidden from the device screen it starts displaying advertisements, these advertisements continue to show even the app is closed.

“Full-screen advertisements are displayed at random intervals with no app title registered in the advertisement window, so users have no way of knowing which app is responsible for the behavior.”

These illicit apps generate revenue to its developers by infecting the user’s device, they generate ads randomly which makes hard for end-users to determine which app is responsible for it.

To play more stealthy, one developer published two identical apps in the store one is the clean and the second one packed with malicious code. In another scenario, they created a malicious copy of the trending apps.

“Unlike the previously hidden app malware we discovered, this batch does not have the icon-hiding function hardcoded in the APK. Instead, the switch is controlled remotely via the downloaded configuration file, allowing the malware developer to evade Google Play’s rigorous security testing.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

HellCat, Rey, and Grep Groups Dispute Claims in Orange and HighWire Press Cases

SuspectFile.com has uncovered a complex web of overlapping claims and accusations within the cybercrime...

AI Surpasses Elite Red Teams in Crafting Effective Spear Phishing Attacks

In a groundbreaking development in the field of cybersecurity, AI has reached a pivotal...

Threat Actors Use Windows Screensaver Files as Malware Delivery Method

Cybersecurity experts at Symantec have uncovered a sophisticated phishing campaign targeting various sectors across...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

Threat Actors Use Windows Screensaver Files as Malware Delivery Method

Cybersecurity experts at Symantec have uncovered a sophisticated phishing campaign targeting various sectors across...

NEPTUNE RAT Targets Windows Users, Steals Passwords from 270+ Applications

A recent cyber threat named Neptune RAT has emerged as a rising concern for...