Monday, May 5, 2025
HomeCyber Security NewsAndroid Trojan On the Google Play Store With Over 500,000 Installs Steals...

Android Trojan On the Google Play Store With Over 500,000 Installs Steals from Notifications

Published on

SIEM as a Service

Follow Us on Google News

On the Google Play Store, the cybersecurity analysts at Dr.Web have recently witnessed a major tip in trojan infiltration. Not only that even they have also detected one application that has more than 500,000 installs and steals users’ data from the notifications.

The threat actors use these malicious applications that belong to a family of trojan malware to perform several malicious tasks like:-

  • Scams
  • Data theft
  • Financial losses
  • Loss of sensitive personal information

Trojans Tracked

Here below we have mentioned all the trojans tracked by the cybersecurity experts at Dr.Web:-

- Advertisement - Google News
  • Android.Spy.4498
  • Android.HiddenAds.3018
  • Android.HiddenAds.624.origin
  • Android.MobiDash.6922
  • Android.MobiDash.6929
  • Program.FakeAntiVirus.1
  • Program.SecretVideoRecorder.1.origin
  • Program.KeyStroke.3
  • Program.WapSniff.1.origin
  • Program.FreeAndroidSpy.1.origin
  • Tool.SilentInstaller.14.origin
  • Tool.SilentInstaller.6.origin
  • Tool.SilentInstaller.13.origin
  • Tool.SilentInstaller.7.origin
  • Tool.Loic.1.origin
  • Adware.AdPush.36.origin
  • Adware.SspSdk.1.origin
  • Adware.Myteam.2.origin
  • Adware.Adpush.16510
  • Adware.Adpush.6547

Fake WhatsApp mods

Among the detected Trojan malware, Android.Spy.4498 trojan is the one that is traced with high activity on the Google Play Store. The Android.Spy.4498 trojan is the unofficial modifications (mods) of WhatsApp messenger such as:-

  • GBWhatsApp
  • OBWhatsApp
  • WhatsApp Plus

The threat actors are spreading these fake malicious WhatsApp mods through several mediums like:-

  • Social media posts
  • Forums
  • SEO poisoning

Moreover, it has been also detected that all these above-mentioned malicious mods offer multiple utility features, and here they are:-

  • Arabic language support
  • Home screen widgets
  • Separate bottom bar
  • Hide status options
  • Call blocking
  • Auto-save received media

Other trojans on the Play Store

Along with this trojan, multiple numbers of trojan malware were detected on the Play Store by the experts of Dr.Web security firm. On the Google Play Store, the attackers are spreading threats under the hood of multiple genuine-looking applications.

Types of applications scattered by the threat actors on Google Play Store:-

  • Cryptocurrency management apps
  • Social benefit aid tools
  • Gazprom investment clones
  • Photo editors
  • A launcher themed after iOS 15

For diverting the stolen money from the victim’s account to the scammer’s bank account, the attacker tricks the user to deposit money for trading in the fake investment apps.

While in the case of other applications, the attackers trick the users into signing up for the costly subscriptions to steal their money.

Here the threat actors abuse the Flurry stat service to seize the notifications from the Google Play Store and the Samsung Galaxy Store apps.

Recommendations

For mitigations, the cybersecurity researchers have recommended:-

  • Avoid downloading APK’s from unknown sources.
  • Always check user reviews before downloading any applications.
  • Be cautious about the permission requested by the apps during the installation.
  • Always monitor the battery and internet data consumption.
  • Make sure to enable the Google Play Protect. 
  • Always use a robust mobile security tool.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

xAI Developer Accidentally Leaks API Key Granting Access to SpaceX, Tesla, and X LLMs

An employee at Elon Musk’s artificial intelligence venture, xAI, inadvertently disclosed a sensitive API...

North Korean Hacker Tries to Infiltrate Kraken Through Job Application

Leading cryptocurrency exchange Kraken has disclosed that it recently thwarted an infiltration attempt by...

Multiple Flaws in Tenda RX2 Pro Let Attackers Gain Admin Access

Security researchers have uncovered a series of critical vulnerabilities in the Tenda RX2 Pro...

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks

Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

xAI Developer Accidentally Leaks API Key Granting Access to SpaceX, Tesla, and X LLMs

An employee at Elon Musk’s artificial intelligence venture, xAI, inadvertently disclosed a sensitive API...

North Korean Hacker Tries to Infiltrate Kraken Through Job Application

Leading cryptocurrency exchange Kraken has disclosed that it recently thwarted an infiltration attempt by...

Multiple Flaws in Tenda RX2 Pro Let Attackers Gain Admin Access

Security researchers have uncovered a series of critical vulnerabilities in the Tenda RX2 Pro...