Friday, March 29, 2024

Malware in Minecraft mods Games Attack More Than 1 Million Android Users

Minecraft is a sandbox video game developed by Mojang. The first version of Minecraft was released earlier in 2009, but the game remains incredibly popular to the present day. It is the best-selling video game of all time, with 200 million copies sold and 126 million monthly active users as of 2020.

Since July of this year, Kaspersky researchers have detected quite 20 apps on Google Play claiming to be modpacks for Minecraft, when their primary purpose is to display ads on smartphones and tablets in a particularly intrusive manner.

Fake Minecraft mods on Google Play

Most of the deceitful apps already been removed from Google Play. The five that remained were:

  • Zone Modding Minecraft,
  • Textures for Minecraft ACPE,
  • Seeded for Minecraft ACPE,
  • Mods for Minecraft ACPE,
  • Darcy Minecraft Mod.

The most popular had quite 1 million installs. Even the least popular was downloaded 500 times, the report said.

Although the apps have different publishers, two of the fake modpacks carried almost the same description. The app reviews are contradictory.

Average ratings hover around the 3-star mark, but overall, scores are highly polarized, mostly 5s and 1s (as shown in the screenshots below). This implies the real users are very unhappy.

In this case, the cybercriminals are targeting kids and teenagers, who may not pay attention to ratings and reviews before installing an app.

The malware creators can also attempt to get back the apps back within the store since the users have already got the apps installed on their smartphones.

Fake mods on the device

The irritated user closes the app, which promptly vanishes. “Because the ‘modpack’ seemed glitchy from the start, most users, especially kids and teens, won’t waste time looking for it.

Forgotten, the app still runs in the background, starts displaying ads. The sample examined automatically opened a browser window with ads every two minutes”, says the report.

The Apps can open Google Play and Facebook or play YouTube videos, counting on the C&C server’s orders. Regardless of the case, the stable stream of full-screen ads makes the phone almost unusable.

How to remove malicious Minecraft modpacks

The only way to defeat the problem is to get rid of the malicious app. After identifying the malicious app, in device settings (Settings → Apps and notifications → Show all apps) delete it from there.

Fortunately, the misbehaving modpacks get removed entirely with deletion and do not try to restore themselves.

Conclusion

It’s better to educate the youngsters about the potential dangers of apps, including ones on Google Play. Particularly, focus on poorly written descriptions and wildly varying ratings and reviews, and be sure to install a mobile antivirus utility on the device.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Delete Now! – These 21 Apps With More Than 7 Million Downloads Contains Malware

Winnti APT Hacker Group Attacks Video Gaming Companies Using PipeMon Malware

Website

Latest articles

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles