Monday, January 6, 2025
HomeAndroidGoogle Officially Banned Crypto-Currency Mining Apps From Play Store

Google Officially Banned Crypto-Currency Mining Apps From Play Store

Published on

Google officially banned the Crypto-currency mining apps from Play Store and Google updated its privacy policies which say, “We don’t allow apps that mine cryptocurrency on devices.”

Recently Apple banned the crypto-currency mining apps in the iOS App Store and Mac App Store.

But it allows mining from the cloud but the current ban leads to stop mining on Android hardware and Google says “We permit apps that remotely manage the mining of cryptocurrency,”

- Advertisement - SIEM as a Service

According to CNET statement, Cryptocurrencies such as bitcoin can be “mined” by using multiple devices to solve complex mathematical problems that lock and unlock information in the blockchain, with rewards coming as each transaction is secured.

Also, this ban on cryptocurrency miners in the Play Store follows a Google block on cryptomining extensions on the Chrome Web Store, following the rise in CoinHive-based in-browser miners.

Initial infection is slowly started in the infected device and it slows down the system process and loading apps will take longer than usual. Later miner utilizes the device and consuming 100% of the device resources to mining the cryptocurrency.

Last month Android-based cryptocurrency mining malware now started infecting Amazon Fire TV & Fire TV Stick Devices.

Likewise, cybercriminals are secretly mining crypto-mining using various malicious techniques and generate millions of dollar revenue without the user’s knowledge.

In this case, Apple’s clamp down on cryptocurrencies covered both potential damages they can cause to the hardware, such as battery drain and excessive heat, restricted ICOs (initial coin offerings) to established bank

Google Presented the Statement that stats, We don’t allow apps that merely provide the same experience as other apps already on Google Play. Apps should provide value to users through the creation of unique content or services.”

Earlier released Apple Statement said, “Mining: Apps may not mine for cryptocurrencies unless the processing is performed off the device (e.g. cloud-based mining),” says one of Apple’s cryptocurrency policies.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

WordPress Plugin Vulnerability Exposes 3 Million Websites to Injection Attacks

A critical vulnerability has been identified in the popular UpdraftPlus: WP Backup & Migration...

iPhone Sharing the Photos by Default to Apple

A recent blog post by developer Jeff Johnson has brought to light a new...

Stealthy Steganography Backdoor Attacks Target Android Apps

BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on...

The Defender vs. The Attacker Game

The researcher proposes a game-theoretic approach to analyze the interaction between the model defender...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

WordPress Plugin Vulnerability Exposes 3 Million Websites to Injection Attacks

A critical vulnerability has been identified in the popular UpdraftPlus: WP Backup & Migration...

iPhone Sharing the Photos by Default to Apple

A recent blog post by developer Jeff Johnson has brought to light a new...

Stealthy Steganography Backdoor Attacks Target Android Apps

BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on...