Typically, users who want to find and install android apps of the highest quality are recommended to rely on Google Play Store as one of the most trusted sources.
In order to prevent fraud in the official Play Store, Google has removed dozens of fraudulent apps. Through the virtual marketplace, these fraudulent apps have been spotted spreading the following malware families like:-
In the latest study conducted by Zscaler ThreatLabz and Pradeo, it was shown that the same pattern is emerging. This malware is still making its way into Google’s official app store, despite the fact that the malware’s traces are regularly modified to avoid detection.
Although the official app store has been updated to remove some malware, the malware is still present. Joker is a fleeceware that makes the users to subscribe to unwanted paid services, and gathers the following data:-
Two cybersecurity firms have identified a total of 53 Joker downloader apps, which have been downloaded over 330,000 times cumulatively by the two security firms.
Typically, these apps pretend to be something that they are not, like:-
Here below we have listed all the malicious applications:-
There is a wide range of malware programs that are developed by the Joker malware authors ranging from extremely complex to the most basic of applications.
The remote nature of these malicious apps is, to a large extent, one of the reasons why they are often unnoticed by antivirus softwares and the Play Store when they are evaluated.
It has also been discovered that Facebook users have been targeted by a type of malware known as Facestealer, found on the Google Play Store.
When a user successfully logs in, the malware author steals both the username and password along with the authentication tokens.
Besides the usual rules of thumb when it comes to downloading apps from app stores. Apart from this, users are recommended to follow these mitigations:-
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical vulnerability…
A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to masquerade…
A recent phishing campaign has targeted customers of SBI Bank through a deceptive message circulating…
The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers. By leveraging compromised…
A significant security vulnerability, designated CVE-2025-21613, has been discovered in the go-git library, used for…
Colm O hEigeartaigh announced a critical vulnerability affecting various versions of Apache CXF, a widely-used…