Monday, February 17, 2025
HomeMalwareHackers Abuse Microsoft Store & Publish Fake Google Photos App under Google...

Hackers Abuse Microsoft Store & Publish Fake Google Photos App under Google LLC Name

Published on

SIEM as a Service

Follow Us on Google News

Third-party developers abusing Microsoft Apps store & publish fake Google Photos App under the Google LLC name but it is originally an Ad clicker which is running in the back round of the windows system.

It’s a completely malicious app that performs various unwanted actvities once installed on the victim’s machine.

It Seems developers managed to trick Microsoft’s certification and published the app as “Album by Google Photos” under the  Google LLC name in Windows Store.

Also, the review which is given by users told that the app performed various malicious actions and trying to install malware, keep popup the various unwanted advertisements.

Fake Google Photos App Malicious Actvities

Lawrence analyzed this App and said, When a user starts the Album by Google Photos app they will be greeted by a screen asking them to login to Google Photos. This is a legitimate login screen from Google and though I did not see any indications that your logins are being stolen, I would still not advise logging into Google Photos with this app.

According to geeklatest, There are some main reasons prove this Fake Google Photos App is a completely malicious app.

  • Album by G Photos is not available for Android.
  • Published by Google LLC while the official publisher is Google Inc.
  • The app was published in May 2018 and Google hasn’t confirmed it anywhere.
  • The resource bundled with the app is Google Photos logo, rest all are accessed via the web.

The malicious advertisement displays by this fake app similar to the tech support scam that leads to compromise user and the attacker trying to gain access to the victim’s computer using various social engineering technique.

Also, it contains various ad banner and trying to connect with some URLs and it was unclear that how it passed to Microsoft anti-abuse check with the name under Google LLC.

Users need to aware about that “Google Inc” is the official Google publisher on the Microsoft Store so any apps published by Google LLC or similar name is fake

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploit Microsoft Teams Invites to Gain Unauthorized Access

The Microsoft Threat Intelligence Center (MSTIC) has uncovered an ongoing and sophisticated phishing campaign...

Meta’s Bug Bounty Initiative Pays $2.3 Million to Security Researchers in 2024

Meta's commitment to cybersecurity took center stage in 2024 as the tech giant awarded...

Google Chrome Introduces AI to Block Malicious Websites and Downloads

Google has taken a significant step in enhancing internet safety by integrating artificial intelligence...

Fake BSOD Attack Launched via Malicious Python Script

A peculiar malicious Python script has surfaced, employing an unusual and amusing anti-analysis trick...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Fake BSOD Attack Launched via Malicious Python Script

A peculiar malicious Python script has surfaced, employing an unusual and amusing anti-analysis trick...

SocGholish Malware Dropped from Hacked Web Pages using Weaponized ZIP Files

A recent wave of cyberattacks leveraging the SocGholish malware framework has been observed using...

Lazarus Group Targets Developers Worldwide with New Malware Tactic

North Korea's Lazarus Group, a state-sponsored cybercriminal organization, has launched a sophisticated global campaign...