Beware! Downloader Malware Disguised as Game Apps Found On Google Play with More Than 51,100 Installations

The downloader malware dubbed Android.DownLoader.819.origin malware found on Google play downloaded by more than 51,100 Android users.

The downloader malware is capable of installing other malicious applications on the affected devices and launches them.

Doctor Web security researchers found 14 copies of the malicious application distributed by Quoac developer disguised as games.

The Android.DownLoader.819.origin is a modified version of Android.DownLoader.818.origin which distributed as VPN client.

Once the application is triggered it requests for the read and writes access to SD card and then it forces the users to assign it as one of the mobile device administrators.

If the permission is provided then the malicious app hide’s itself on the device and removes the icon from the screen menu and can be found only in the installed programs list.

Without granting all the permission it is not possible to launch the game app, once the app launched it connects with the remote server and downloads the APK and forces the user to install the malicious app.

It continues to show the installation popup for every 20 seconds until the user accepts to install, the installer is the Android.HiddenAds.728 malware which displays the ads on the infected device every time when the screen is active.

Doctor web researchers sent the report to Google play and the malicious apps were removed from the Google play now.

Related Read

GPlayed – New Malware Posed as Google Play App to Spy & Steal Data From Your Entire Android Phone

Beware!! New Android Malware That Can Read Your WhatsApp Messages & Take Screen Shots

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field Communication…

2 hours ago

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored entities,…

2 hours ago

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with 86%…

2 hours ago

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites, with…

3 hours ago

Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations

Cybersecurity firm Volexity has tracked a series of highly targeted attacks by suspected Russian threat…

3 hours ago

Hackers Weaponize Google Forms to Bypass Email Security and Steal Login Credentials

Threat actors are increasingly leveraging Google Forms, the tech giant’s widely-used form and quiz-building tool,…

4 hours ago