Saturday, July 20, 2024

Android Users Beware – Hundreds of Faking Popularity Apps Discovered on Google Play

Tricksters found a new way to boost the popularity of newly uploaded apps by setting the number of installs as their developer names.

When browsing for apps the user seems the user can see three elements app icon, app name and the developer name, tricksters changing the developer’s name to a number of installs to boost the popularity of the apps.

ESET has spotted hundreds of such Faking Popularity apps on Google Play that misleading users about the functionality and most of the apps contain only the advertisements.

The freedom to set any choice of the developer name has been abused by tricksters to set the fake number of downloads as the developer name that appears trustworthy to users.

Faking Popularity

ESET spotted a “developer change his name from a fake installation number to an actual developer name over time, which might indicate the trick is used as a temporary measure aimed at boosting the popularity of newly uploaded apps.”

Some app developers use phrases like “Legit Apps”, “Verified Applications”, “Trusted Developers App”, checkmark symbol for boosting the popularity of newly uploaded apps.

The trick is very simple but it will mislead users who download apps based on the popularity and it could be used by misused by malware authors in the future.

Google has developed new detection models and techniques that can identify repeat offenders and abusive developer networks at scale.

In the year 2017 Google blocked nearly 700,000 Malicious Apps that violated Google Play Store policies based on the following categories Copycats, Inappropriate content and Potentially Harmful Applications (PHAs).

Users should check for the official number’s of downloads on Google play store and the Google play doesn’t offer verification badge for apps.

Also Read

DNS Hijacking Method Used by Powerful Malware to Hack Android, Desktop & iOS Devices

Android Gamers Beware of Fake Fortnite Game that Contains Spyware and Cryptocurrency

MinerMaikspy – A Spyware Attack on Windows & Android Users via Adult Games


Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles