Thursday, March 28, 2024

Hackers Abuse Microsoft Store & Publish Fake Google Photos App under Google LLC Name

Third-party developers abusing Microsoft Apps store & publish fake Google Photos App under the Google LLC name but it is originally an Ad clicker which is running in the back round of the windows system.

It’s a completely malicious app that performs various unwanted actvities once installed on the victim’s machine.

It Seems developers managed to trick Microsoft’s certification and published the app as “Album by Google Photos” under the  Google LLC name in Windows Store.

Also, the review which is given by users told that the app performed various malicious actions and trying to install malware, keep popup the various unwanted advertisements.

Fake Google Photos App Malicious Actvities

Lawrence analyzed this App and said, When a user starts the Album by Google Photos app they will be greeted by a screen asking them to login to Google Photos. This is a legitimate login screen from Google and though I did not see any indications that your logins are being stolen, I would still not advise logging into Google Photos with this app.

According to geeklatest, There are some main reasons prove this Fake Google Photos App is a completely malicious app.

  • Album by G Photos is not available for Android.
  • Published by Google LLC while the official publisher is Google Inc.
  • The app was published in May 2018 and Google hasn’t confirmed it anywhere.
  • The resource bundled with the app is Google Photos logo, rest all are accessed via the web.

The malicious advertisement displays by this fake app similar to the tech support scam that leads to compromise user and the attacker trying to gain access to the victim’s computer using various social engineering technique.

Also, it contains various ad banner and trying to connect with some URLs and it was unclear that how it passed to Microsoft anti-abuse check with the name under Google LLC.

Users need to aware about that “Google Inc” is the official Google publisher on the Microsoft Store so any apps published by Google LLC or similar name is fake

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles