Friday, June 14, 2024

Hackers Abuse Microsoft Store & Publish Fake Google Photos App under Google LLC Name

Third-party developers abusing Microsoft Apps store & publish fake Google Photos App under the Google LLC name but it is originally an Ad clicker which is running in the back round of the windows system.

It’s a completely malicious app that performs various unwanted actvities once installed on the victim’s machine.

It Seems developers managed to trick Microsoft’s certification and published the app as “Album by Google Photos” under the  Google LLC name in Windows Store.

Also, the review which is given by users told that the app performed various malicious actions and trying to install malware, keep popup the various unwanted advertisements.

Fake Google Photos App Malicious Actvities

Lawrence analyzed this App and said, When a user starts the Album by Google Photos app they will be greeted by a screen asking them to login to Google Photos. This is a legitimate login screen from Google and though I did not see any indications that your logins are being stolen, I would still not advise logging into Google Photos with this app.

According to geeklatest, There are some main reasons prove this Fake Google Photos App is a completely malicious app.

  • Album by G Photos is not available for Android.
  • Published by Google LLC while the official publisher is Google Inc.
  • The app was published in May 2018 and Google hasn’t confirmed it anywhere.
  • The resource bundled with the app is Google Photos logo, rest all are accessed via the web.

The malicious advertisement displays by this fake app similar to the tech support scam that leads to compromise user and the attacker trying to gain access to the victim’s computer using various social engineering technique.

Also, it contains various ad banner and trying to connect with some URLs and it was unclear that how it passed to Microsoft anti-abuse check with the name under Google LLC.

Users need to aware about that “Google Inc” is the official Google publisher on the Microsoft Store so any apps published by Google LLC or similar name is fake


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles