Monday, January 27, 2025
HomeAdware85 Malicious Photography and Gaming Adware Apps Installed Over 8 Million Times...

85 Malicious Photography and Gaming Adware Apps Installed Over 8 Million Times From Play Store

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered nearly 85 malicious adware apps in Google play store that intended to upload for delivering adware and monetize from affected Android devices.

These Fraudulent adware apps were installed over 8 million times from the Google play store, and the malicious ads displaying in the affected phone are very difficult to close.

Past two-years adware is playing a vital role in cybercrime to cost businesses huge financial losses, and it also targets the millions of individual Android users.

These malicious app developers are employing a unique and sophisticated technique to evade the detection based on user behaviors.

Researchers discovered these 85 adware apps mostly under photography and gaming apps since these categories are very attractive for Android users.

Adware Infection Process

In order to monitor user behavior and presence, the app is recording the 2 ( “installTime”, “network time” ) different timestamps by abusing a publicly available and legitimate RESTful API.

Soon after it registers an Android component known as Broadcast Receiver that helps to monitor the user behavior after a device is woken up.

Every time the user unlocks the phone, adware keeps on performing the several checks by comparing the current time with a timestamp.

After 30 minutes from the installation, the adware app icon and create a shortcut on the device’s home screen without making any different and unusual appearance.

Adware app shortcut being created and displayed

Attackers using this kindly of a method for their malicious app from being uninstalled by dragging and dropping its icon to the Uninstall section of the screen.

Displaying The Ads

Adware app registers another broadcast receiver to check if the victims unlocked the mobile. The advertisements will be displayed on the screen once it confirmed that the device is unlocked.

According to Trend Micro research, It also uses installTime and networkInstallTime to identify how long it has been installed on the device. Apart from that, it also checks the last advertisement to make sure that it doesn’t show the same ad too frequently.

 full-screen advertisements

Ads are shown in the full screen of the mobile and forcefully view the whole duration of the ad before being able to close it and prevent to go back to access other application until the ad gets automatically closed.

All the malicious adware apps are reported to Google, and the adware-embedded apps are no longer on the Play store.

You can check here the Top 5 Best Adware Removal Tool to Block Annoying Ads in your mobile and computer.

Sponsored:  – Manage all the Endpoint networks from a single Console.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical Vulnerability in Meta Llama Framework Let Remote Attackers Execute Arbitrary Code

The Oligo Research team has disclosed a critical vulnerability in Meta’s widely used Llama-stack...

INE Security Alert: Expediting CMMC 2.0 Compliance

INE Security, a leading global provider of cybersecurity training and certifications, today announced a...

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to...

Security Risk Advisors Announces Launch of VECTR Enterprise Edition

Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition, a premium version...

4 Leading Methods of Increasing Business Efficiency 

The more efficient your core business operations, the more motivated and productive your employees...