Firewall Daily

Cybersecurity Researchers Find 35 Malware-injected Apps on Google Play

Cybersecurity researchers found 35 malicious apps on Google Play Store, having over 100,000 downloads by millions of Android users. Bitdefender shared its report about these apps and recommended that if users have downloaded any of them, they should uninstall them immediately.

Though Google Play Store has several protection layers for grading the apps as “safe to use,” sometimes, a particular bunch of apps bypasses the grading feature. These app developers try different methods to inject malware into the apps and host them on the Play Store.

The cybersecurity news company Bitdefender found a ground-breaking report about 35 malware-injected apps running freely on the platform and issued a warning to users who downloaded these apps.

Bitdefender explains malware-injected apps

On August 17, 2022, the cybersecurity company shared a detailed post about a malware campaign led by an unknown TA (Threat Actor). The report stated, “Numerous apps use false pretexts to lure victims into installing them, only to change their name and aggressively serve ads afterwards.” The company identified 35 applications that have made their way into Google Play Store, averaging over two million downloads.

The apps hid their true intent by renaming themselves after installation, and even their icons changed so that the users could not find them again. As per Bitdefender, the app starts serving aggressive ads that link directly to the malware.

Though many Google Play apps show ads to users, these malware-infected apps use their own framework to serve malware without letting the users know. Sometimes, if the user wishes to delete the app after installation, it changes its name and icon and even conceals its presence on the target device.

Bitdefender identifies the malicious apps using a new real-time behavioral technology. The company also said the recent detections are instantly shared with Bitdefender Mobile Security users.

List of malware-injected apps

The developers behind the malware-injected applications added heavy coded obfuscation and encryption, making the reverse engineering process difficult. However, Bitdefender found the apps that were using the obscuring methods to hide inside the OS — apps claiming to be ‘Settings,’ ‘GPS,’ and essential pieces of software on the device. These apps also used an interesting technique that allows them to not show in the recently used apps.

The report also stated that all the publisher accounts uploaded only one app, and the emails and websites associated with the malicious applications look identical. Additionally, the malware-injected apps were packed using the same patterns and a similar naming style. Based on these findings, Bitdefender stated that “all of these apps are the work of a single group or even developer.”

Here is a list of malware-injected apps running freely on the Google Play Store. The cybersecurity firm has advised removing these apps as soon as possible because they can spread malware into users’ devices after installation.

Malware on Android

Following the report, Bitdefender published a list of recommendations to fight against hackers and malware-injected apps. It explains that just because an app is available on Google Play Store doesn’t mean it will be okay to use.

thecyberexpress

View Comments

Recent Posts

The Cyber Express Weekly Roundup: AI Disruption, Regulatory Pressure, and the Evolving Cyber Threat Landscape

AI fraud, deepfake probes, SME cyber warnings, and ransomware cases highlight rising global risks in this week’s Cyber Express roundup.

2 days ago

French National Bank Authority Breach Exposed 1.2 Million Accounts

French national bank authority confirmed a major data breach affecting 1.2 million bank accounts after a malicious actor stole credentials…

2 days ago

What Big Tech Leaders Said On AI’s Future at India AI Impact Summit 2026

The real success of AI will not only depend on how powerful the technology becomes, but on how safely, fairly,…

2 days ago

Two Petabytes Worth Data of Israeli’s Siphoned, Says Cyber Head

Israel data breach totals two petabytes, with phishing up 35% and cyber influence attacks rising 170%, says Yossi Karadi.

2 days ago

Cyberattack Forces Clinic Closures, Surgery Cancellations at University of Mississippi Medical Center

The UMMC cyberattack halted surgeries, closed clinics statewide and triggered a federal probe into potential patient data exposure.

2 days ago

First Android Malware Weaponizes Gemini AI to Evade Detection, Maintain Persistence

ESET researchers discovered PromptSpy, the first known Android malware to integrate generative AI directly into its execution flow, marking a…

3 days ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More