Thursday, January 30, 2025
HomeAndroid4 Million Android Users Infected by Malicious Beauty Camera App From Google...

4 Million Android Users Infected by Malicious Beauty Camera App From Google Play that Steals Personal Pictures

Published on

SIEM as a Service

Follow Us on Google News

Google play Store flooding the several malicious beauty camera apps that steal Android users sensitive images and apps, the malicious app was already downloaded by more than 4 million Android users.

Initially, these apps don’t indicate any malicious activities until infected users decide to delete the app and the maximum number of downloads originated from Asia.

These apps are difficult to uninstall since the hide its icon from the application list that make difficult to drag the app and uninstall from home page.

For instances, one of the malicious app from Google play store called com.beauty.camera.project.cloud popups the pornography contents ads whenever infected users unlock the screen.

malicious beauty camera apps

Researchers found a paid online pornography player (detected as AndroidOS_PornPlayer.UHRXA) that was downloaded when clicking the pop-up.

29 apps were claiming to be camera or photo-editing related, with the top three, “Pro Camera Beauty,” “Cartoon Art Photo,” and “Emoji Camera,” getting over 1 million downloads each, while others like “Artistic effect Filter,” “Selfie Camera Pro,” and “Horizon Beauty Camera,” had over 100,000 downloads each.

Malicious Android Apps infection Process

Malicious ads are doesn’t indicate anything and its very difficult for users to determine that where it come from and who is behind these ads.

Some of the malicious Android apps are redirecting users to Phishing websites where the users tricks and give away their personal information, such as addresses and phone numbers.

malicious beauty camera apps

For instance, one of the apps that you can see in the above image indicates to force users to click OK that leads to one of the malicious websites which claim that the user wins the cash price and asking the personal details.

According to Trend micro “Further investigation led to another batch of photo filter-related apps that share similar behavior on Google Play. These apps seemingly allow users to “beautify” their pictures by uploading them to the designated server. “

malicious beauty camera apps

Finally, instead of edited photo result, Users getting the picture with a fake update prompt in nine different languages and the attackers collect the uploaded photo for malicious purpose.

All the malicious apps ware reported to Google and it was taken down from Google play but still already downloaded users are affected by these malicious apps.

Given that many of these malicious apps take great pains to look as legitimate as possible, users should always investigate the legitimacy of an app. One good method of doing this is by checking reviews from other users, Trend Micro said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

2 Android Apps From Google Play Store Launching Banking Malware With Sophisticated Evasion Techniques

9 Fake Apps Found On Google Play With More than 8 Million Installs

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

OPNsense 25.1 Released, What’s New!

The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this...

DeepSeek is Now Available With Microsoft Azure AI Foundry

Microsoft has officially added DeepSeek R1, an advanced AI model, to its Azure AI...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

OPNsense 25.1 Released, What’s New!

The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this...