Malicious Code in Kids Game Apps on Google Play Pushing Porn Ads – More than 60 Game Apps Infected

Cybercriminals started focussing on game apps which are used by children to install fake apps, registering premium services and porn ads.

Security researchers from checkpoint identified the malicious code dubbed “AdultSwine” hides into more than 60 game apps and they are downloaded between 3 million and 7 million times.

How does it Displaying  Porn Ads

The malicious apps targetting victims by displaying inappropriate pornographic ads, tricking to install fake security apps and premium subscriptions.

Once the malicious app is installed on the device, it waits for a boot to occur or for a user to unlock his screen, upon which it initiates its malicious activity, researchers said.

Also Read: A Man Used Fruitfly macOS Malware over 13 Years For Spying Thousand of Computers

Functions of Malicious Code

Displaying pornographic ads

Once the malicious app triggered it contacts the C&C server to report installation and provides the device details and it determines which ads to be displayed on which apps.

Then it verifies what are the apps running on the device, once all the conditions satisfied it will start showing inappropriate apps.

Tricking users to install security apps

It uses to scare use by displaying that your device “infected with a virus” and shows notification “Remove Virus Now” posing a fake virus remover app from the google play store. Even after Google play, crooks find some advanced sophisticated methods to add malicious apps to play store.

Forcing to register For Premium Services

Another technique is forcing users to register for fraudulent premium services charging victims credit account, it initially displays a popup add and attempts to convince the user to register for premium service.

It tricks “that user deserving to win an iPhone by answering short questions” and get the number from users and the ad itself register for premium services.

Common Defences and Mitigations

Researchers from Checkpoint notified to google and the affected apps removed now.

  • Give careful consideration to the permission asked for by applications.
  • Download applications from trusted sources.
  • Stay up with the latest version.
  • Encrypt your devices.
  • Make frequent backups of important data.
  • Install anti-malware on their devices.
  • Stay strict with CIA Cycle.
Guru baran

Recent Posts

Exploitation Methods Used by PlugX Malware Revealed by Splunk Research

PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid detection by antivirus programs, making it…

10 hours ago

TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities

Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative targets.  Outlook vulnerabilities offer:- Access to…

16 hours ago

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been discovered. This vulnerability can be exploited…

1 day ago

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in multiple products. The CVEs for these…

1 day ago

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new AI-powered capability enhancing its Smart Alerting…

1 day ago

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat actors unauthorized access to sensitive data.…

1 day ago