Monday, March 3, 2025
HomeSecurity NewsFake Android Apps that Impersonate as Security Applications Found in Play store...

Fake Android Apps that Impersonate as Security Applications Found in Play store with 6000,000 Installations

Published on

SIEM as a Service

Follow Us on Google News

Newly discovered Fake Android Apps in Google play store that posed as offering security proving unwanted ads and other potential cyber threats to installed user device and collection a lot of sensitive information.

In this case, 35 Malicious Fake Android Apps discovered in official Google Play Store that posed as security apps but it doesn’t contain any of security future.

A lot of these fake security apps are impersonating as security application and show malicious ads to generating revenue.

All the discovered Fake Android Apps installed over 6 Million times in the user devices and these apps are being under the radar for last few years.

Also not all the apps were downloaded manually but some of these applications are downloaded and installed by bots to post positive reviews and improve their respective app’s ratings.

Fake Android Apps
35 Apps that offer Fake security prevention

It Mimics as very primitive security checkers relying on a few trivial hardcoded rules and eventually it flag legitimate security apps as malicious.

Also, it creates false alerts to victims as your mobile under potential risk state by malware which actually doesn’t perform any malicious activities.

According to ESET Researchers, among these 35 apps, only a handful stand out for their specific features: one app is not completely free as it offers a paid upgrade; one app has implemented a primitive, easily bypassed, app-locker manager; another app flags other apps from this group as dangerous by default.

Fake Android Apps

How the Fake Android Apps Mimic as Real Security Apps

All the flagged fake security apps are posed as actual mobile security solutions and it staying under the radar to avoid detection and their app detection mechanisms easy to bypass.

These fake security  apps are 4 categories that contain  Security-mimicking functionality

Package name whitelist & blacklist 

Its Whitelisting Popular apps such as Facebook, Instagram, LinkedIn, Skype and others. its blacklist few apps.

Permissions blacklist

All apps (including legitimate ones) are flagged if they require some of the listed permissions that are considered dangerous, such as send and receive SMS, access location data, access the camera, etc.

 Source whitelist

All apps but those from the official Android store, Google Play, are flagged – even if they are completely benign.

 Activities blacklist

All apps that contain any of the blacklisted activities: that is, parts of applications. This mainly concerns some ad-displaying activities.

You can Refer the ESET for IOC’s and Fake AntiVirus Apps Name.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage...

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations...

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data

A new variant of malware, dubbed "Poco RAT," has emerged as a potent espionage...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...