Sunday, March 3, 2024

Android Users Beware – Hundreds of Faking Popularity Apps Discovered on Google Play

Tricksters found a new way to boost the popularity of newly uploaded apps by setting the number of installs as their developer names.

When browsing for apps the user seems the user can see three elements app icon, app name and the developer name, tricksters changing the developer’s name to a number of installs to boost the popularity of the apps.

ESET has spotted hundreds of such Faking Popularity apps on Google Play that misleading users about the functionality and most of the apps contain only the advertisements.

The freedom to set any choice of the developer name has been abused by tricksters to set the fake number of downloads as the developer name that appears trustworthy to users.

Faking Popularity

ESET spotted a “developer change his name from a fake installation number to an actual developer name over time, which might indicate the trick is used as a temporary measure aimed at boosting the popularity of newly uploaded apps.”

Some app developers use phrases like “Legit Apps”, “Verified Applications”, “Trusted Developers App”, checkmark symbol for boosting the popularity of newly uploaded apps.

The trick is very simple but it will mislead users who download apps based on the popularity and it could be used by misused by malware authors in the future.

Google has developed new detection models and techniques that can identify repeat offenders and abusive developer networks at scale.

In the year 2017 Google blocked nearly 700,000 Malicious Apps that violated Google Play Store policies based on the following categories Copycats, Inappropriate content and Potentially Harmful Applications (PHAs).

Users should check for the official number’s of downloads on Google play store and the Google play doesn’t offer verification badge for apps.

Also Read

DNS Hijacking Method Used by Powerful Malware to Hack Android, Desktop & iOS Devices

Android Gamers Beware of Fake Fortnite Game that Contains Spyware and Cryptocurrency

MinerMaikspy – A Spyware Attack on Windows & Android Users via Adult Games

Website

Latest articles

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles