Friday, May 16, 2025
HomeAndroidGoogle Removed 145 Malicious Apps from Google Play Store that Carries Windows...

Google Removed 145 Malicious Apps from Google Play Store that Carries Windows Malware

Published on

SIEM as a Service

Follow Us on Google News

Google removed around 145 apps from the Google Play store that infected by Windows Malware which are not developed to infect the Android platform but for windows OS devices.

Removed APK files are infected while developers are creating these apps in compromised windows platform where attackers infect the applications with Windows-based keylogger.

These types of attacks are targeting the software supply chain which means that, trusted compromised platform used for carries the infection to other platforms.

- Advertisement - Google News

These infected apps are being in the Google Play store for almost 6 months and most the apps are released in the Google Play store between October 2017 and November 2017.

All among the removed infected apps have more than 1,000 installations and 4-star ratings and all the apps are not belongs to a single developer.

According to paloalto networks researchers, Most of the infected apps are  include “Learn to Draw Clothing”, an app teaching people how to draw and design clothing; “Modification Trail”, an app showing images of trail bike modification ideas; “Gymnastics Training Tutorial”, an app letting people find healthy ideas for gymnastic moves.”

How Does this Malware infection Work

Researchers identified different malicious PE files that infected different apps and there are 2 main PE files that infect many of the removed apps.

Apart from this, researchers identified several malicious PE files and these infection files indicate that developers used machines are having a serious infection.

All among the removed malicious apps, there is one common malicious PE files that infect almost all the Android apps which carry windows Keylogger.

This Windows Malware contains not only keylogging future but it steals sensitive information like credit card numbers, social security numbers and passwords.

“These files fake their names to make their appearance look legitimate. Such names include “Android.exe”, “my music.exe”, “COPY_DOKKEP.exe”, “js.exe”, “gallery.exe”, “images.exe”, “msn.exe” and “css.exe”.­”

Also, it contains other malicious activities such as attempts to sleep for a long period, Changes Windows registry, Creates executable and hidden files.

“The Windows Malware cannot directly run on the Android hosts. However, if the APK file is unpacked on a Windows machine and the PE files are accidentally executed, or the developers also issue Windows-based software, or if the developers are infected with malicious files runnable on Android platforms, the situation will go much worse, researchers said.”

All the infected apps have been reported to the Google Security Team and all infected apps have been removed from Google Play.

Also Read

Beware of Fake Banking Malware Apps in Google Play That Steals Credit Card Details and Internet Banking Credentials

Most Important Android Security Penetration Testing Tools for Hackers & Security Professionals

Google Released Security Updates for More than 40 Android Security vulnerabilities

Android Device With Open ADB Ports Exploited to Spread Satori Variant of Mirai Botnet

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Windows 10 KB5058379 Update Causes PCs to Enter Recovery Mode and Prompt for BitLocker Key

Security update KB5058379 for Windows 10, released in May 2025, is causing significant technical...

Cybercriminal Andrei Tarasov Escapes US Extradition, Returns to Russia

Andrei Vladimirovich Tarasov, a 33-year-old Russian cybercrime figure known online as "Aels," has returned...

FBI Alerts Public to Malicious Campaign Impersonating US Government Officials

Federal Bureau of Investigation has issued a warning about an ongoing malicious messaging campaign...

Frigidstealer Malware Targets macOS Users to Harvest Login Credentials

An macOS users, a new information-stealing malware dubbed FrigidStealer has emerged as a formidable...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Frigidstealer Malware Targets macOS Users to Harvest Login Credentials

An macOS users, a new information-stealing malware dubbed FrigidStealer has emerged as a formidable...

SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign

A meticulously orchestrated phishing campaign targeting Kuwait's fisheries, telecommunications, and insurance sectors has been...

Hackers Target Industrial Automation Systems Using Over 11,600 Malware Variants

Hackers are stepping up their attacks on Industrial Control Systems (ICS) in the first...