Categories: Security News

Android Users Beware – Hundreds of Faking Popularity Apps Discovered on Google Play

Tricksters found a new way to boost the popularity of newly uploaded apps by setting the number of installs as their developer names.

When browsing for apps the user seems the user can see three elements app icon, app name and the developer name, tricksters changing the developer’s name to a number of installs to boost the popularity of the apps.

ESET has spotted hundreds of such Faking Popularity apps on Google Play that misleading users about the functionality and most of the apps contain only the advertisements.

The freedom to set any choice of the developer name has been abused by tricksters to set the fake number of downloads as the developer name that appears trustworthy to users.

ESET spotted a “developer change his name from a fake installation number to an actual developer name over time, which might indicate the trick is used as a temporary measure aimed at boosting the popularity of newly uploaded apps.”

Some app developers use phrases like “Legit Apps”, “Verified Applications”, “Trusted Developers App”, checkmark symbol for boosting the popularity of newly uploaded apps.

The trick is very simple but it will mislead users who download apps based on the popularity and it could be used by misused by malware authors in the future.

Google has developed new detection models and techniques that can identify repeat offenders and abusive developer networks at scale.

In the year 2017 Google blocked nearly 700,000 Malicious Apps that violated Google Play Store policies based on the following categories Copycats, Inappropriate content and Potentially Harmful Applications (PHAs).

Users should check for the official number’s of downloads on Google play store and the Google play doesn’t offer verification badge for apps.

Also Read

DNS Hijacking Method Used by Powerful Malware to Hack Android, Desktop & iOS Devices

Android Gamers Beware of Fake Fortnite Game that Contains Spyware and Cryptocurrency

MinerMaikspy – A Spyware Attack on Windows & Android Users via Adult Games

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal…

7 hours ago

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting…

8 hours ago

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass…

9 hours ago

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message traffic,…

9 hours ago

Scattered Spider Launches Sophisticated Attacks to Steal Login Credentials and MFA Tokens

The cyber threat landscape has witnessed remarkable adaptation from the notorious hacker collective known as…

9 hours ago

North Korean Hackers Use Social Engineering and Python Scripts to Execute Stealthy Commands

North Korean threat actors have demonstrated their adept use of social engineering techniques combined with…

9 hours ago