4 Million Android Users Infected by Malicious Beauty Camera App From Google Play that Steals Personal Pictures

Google play Store flooding the several malicious beauty camera apps that steal Android users sensitive images and apps, the malicious app was already downloaded by more than 4 million Android users.

Initially, these apps don’t indicate any malicious activities until infected users decide to delete the app and the maximum number of downloads originated from Asia.

These apps are difficult to uninstall since the hide its icon from the application list that make difficult to drag the app and uninstall from home page.

For instances, one of the malicious app from Google play store called com.beauty.camera.project.cloud popups the pornography contents ads whenever infected users unlock the screen.

Researchers found a paid online pornography player (detected as AndroidOS_PornPlayer.UHRXA) that was downloaded when clicking the pop-up.

29 apps were claiming to be camera or photo-editing related, with the top three, “Pro Camera Beauty,” “Cartoon Art Photo,” and “Emoji Camera,” getting over 1 million downloads each, while others like “Artistic effect Filter,” “Selfie Camera Pro,” and “Horizon Beauty Camera,” had over 100,000 downloads each.

Malicious Android Apps infection Process

Malicious ads are doesn’t indicate anything and its very difficult for users to determine that where it come from and who is behind these ads.

Some of the malicious Android apps are redirecting users to Phishing websites where the users tricks and give away their personal information, such as addresses and phone numbers.

For instance, one of the apps that you can see in the above image indicates to force users to click OK that leads to one of the malicious websites which claim that the user wins the cash price and asking the personal details.

According to Trend micro “Further investigation led to another batch of photo filter-related apps that share similar behavior on Google Play. These apps seemingly allow users to “beautify” their pictures by uploading them to the designated server. “

Finally, instead of edited photo result, Users getting the picture with a fake update prompt in nine different languages and the attackers collect the uploaded photo for malicious purpose.

All the malicious apps ware reported to Google and it was taken down from Google play but still already downloaded users are affected by these malicious apps.

Given that many of these malicious apps take great pains to look as legitimate as possible, users should always investigate the legitimacy of an app. One good method of doing this is by checking reviews from other users, Trend Micro said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

2 Android Apps From Google Play Store Launching Banking Malware With Sophisticated Evasion Techniques

9 Fake Apps Found On Google Play With More than 8 Million Installs

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

New Auto-Color Malware Attacking Linux Devices to Gain Full Remote Access

Researchers at Palo Alto Networks have identified a new Linux malware, dubbed "Auto-Color," that has…

12 minutes ago

Lumma Stealer Malware Delivered Through Weaponized Files Disguised as Videos

The Lumma Stealer malware, a sophisticated infostealer, is being actively distributed through malicious files disguised…

19 minutes ago

New Attack Hijacks Popular YouTube Gaming Channels to Steal Steam Accounts

Cybersecurity researchers at Bitdefender Labs have uncovered a sophisticated scam targeting the Counter-Strike 2 (CS2)…

20 minutes ago

Over 35,000 Websites Hacked to Inject Malicious Scripts Redirecting Users to Chinese Websites

In a widespread cyberattack, over 35,000 websites have been compromised by a malicious campaign that…

1 hour ago

Researchers Jailbreak OpenAI o1/o3, DeepSeek-R1, and Gemini 2.0 Flash Models

Researchers from Duke University and Carnegie Mellon University have demonstrated successful jailbreaks of OpenAI’s o1/o3,…

4 hours ago

INE Secures Spot Top 50 Education Software Rankings 2025 in G2’s

INE, the leading provider of networking and cybersecurity training and certifications, today announced its recognition…

4 hours ago