Saturday, April 5, 2025
HomeMalware36 Malicious Android Apps Removed From Google Play Store that Mimics as...

36 Malicious Android Apps Removed From Google Play Store that Mimics as Famous Security Tools

Published on

SIEM as a Service

Follow Us on Google News

Several malicious Android Apps removed from Google play store that posed as legitimate security tools and different category of android apps.

Exactly 36 apps are listed in this category that has actually performed similar tasks and also its performing dangerous activities such as secretly harvested user data, tracked user location, and aggressively pushed advertisements.

These 36 apps mimic under legitimate apps such as  Security Defender, Security Keeper, Smart Security, Advanced Boost, and more.

they have to advertise some of the futures including scanning, cleaning junk, saving battery, cooling the CPU, locking apps, as well as message security, WiFi security.

Also Read: LightsOut – Malicious Flashlight Apps on Google Play with Nearly 7.5 Million Downloads

How does this malicious Android Apps Works

Once it installed by the users, Apps will appear neither device launcher’s list of applications nor shortcuts in device screen.

so users can able to see only the notification security warnings and pop-up windows to the users.

These app designed for explicitly hide for the different type of Specific mobile devices such as LG, Xiaomi, Nexus, ZTE N958St etc.

So these malware’s are not doing any specific task in the above-listed mobile model’s and also malware authors designed this to evade the google play store security scan.

Security tools related malicious apps that listed within this 36 apps are showing fake scanning result to intimate to users that they are infected with some kind of malware.

But accroiding to the Trend Micro report,  we found that most detection results from the notifications are false. For example, if the user installs another app, then it will immediately be reported as suspicious. Or the user will be sent notifications like “10.0 GB files are being wasted,” which will prompt some kind of action.
But the data shown in these messages are fake — they are just used to add a layer of legitimacy to the app.

Also, malware authors designed these apps to make users believe that they are actually infected by some kind of vulnerability by showing some of the animation with some vulnerability name.

Once its gains the user information, it is also able to collect the victim’s private data, including specific location details, and send them to a remote server.

Also, it shows many different advertisements, aggressive ads show up during many different scenarios.

All the malicious apps have been reported to Google and all the apps were removed from the Google Play Store.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

Beware of Clickfix: ‘Fix Now’ and ‘Bot Verification’ Lures Deliver and Execute Malware

A sophisticated browser-based malware delivery method, dubbed ClickFix, has emerged as a significant threat...

DeepSeek-R1 Prompts Abused to Generate Advanced Malware and Phishing Sites

The release of DeepSeek-R1, a 671-billion-parameter large language model (LLM), has sparked significant interest...