Detect malicious Android apps on Google Play
Many malicious applications hidden under the cover are popular games like Temple Run hidden on the Google Play app market.
The cybercrime pretended to be famous game and application development companies to put on Google Play a series of malicious products under the covers of famous games from Glu Mobile or Temple Run of Imangi. These "dirty" applications have the same name as the real application name with the "super" in the back.
According to security analysts, cybercriminals decrypted the * .APK files (Android's installation file) and inserted malicious code and then repackaged it. Then upload to Google Play network for Android users to download.
If wary, users will realize that these harmful applications always require a lot of permissions, for example: access to data on the device, user contacts . Specific evidence for game Temple Run really only requires access rights to the network connection and storage of the device. Meanwhile, Temple Run Super requires both geographic location information, device status, access to the device's main account .
Cybercriminals build botnets from mobile devices
The concern of security experts has come true when Security Company CloudMark discovered trojan type that specialized in attacking Google Android platform, botnet establishment and spreading SMS spam messages. Security company Lookout calls the botnet after SpamSoldier.
This type of trojan belongs to malicious applications distributed on websites that offer free applications. Some famous Android games have been inserted with Trojan and spread like Need for Speed Most Wanted, Angry Birds Star Wars, Grand Theft Auto 3 or Max Payne HD.
Once deceiving victims install on smartphones, malicious applications will send thousands of SMS spam messages to a list of malicious phone numbers held, remotely controlled by a server.
Spam messages will include links to malicious applications, to expand the scope of infection and increase numbers in the SMS botnet (network of infected devices and be used as a tool for spreading news. SMS spam messages are controlled by cybercrime).
According to CloudMark, malicious code will automatically activate when the device reboots, and it also transforms itself into a fake system running process. Victims will receive "huge" bills from telecommunications network service providers without understanding the cause.
Not only pretending to be popular games, malicious code is embedded in popular applications such as "blocking spam messages", promotional coupons to make victims fall off guard.
Mobile device users are recommended to install an anti-malware security application and do not install suspicious applications from unreliable websites. Be wary of spam messages with links.
You should read it
- 9 malicious applications on Google Play, if installed, should be removed immediately
- Series of Android applications contain malicious code you should remove immediately from your device
- Detects malicious code showing porn ads in children's games on Google Play
- 4 Android VPN applications with over 500 million downloads were found to be ad fraud
- 14 games on the App Store contain malicious code, iPhone users be careful
- Malware and user security bugs are found in top free VPN applications
- How to detect malicious apps on Android
- Detected 205 malicious applications with more than 32 million downloads on Google Play only in last July
May be interested
- 9 malicious applications on Google Play, if installed, should be removed immediatelyrecently, trend micro security researchers discovered a series of optimization applications, speeding up phones on google play containing androidos_badbooster.hrx malware.
- More than 200 apps containing malicious code were discovered and downloaded millions of times on the Google Play Store.a cybersecurity firm has discovered a huge number of android apps containing malicious code (adware), a discovery that also raises big questions about how google monitors its online store.
- Detected 205 malicious applications with more than 32 million downloads on Google Play only in last Julylukas stefanko, eset's malware researcher, discovered 205 malicious applications on google's store in just july. the total number of downloads of these applications has reached over 32 million.
- Great apps only available on Androidgoogle play is slowly catching up with the huge number on the app store that apple has 'built up' to build. for android believers, the new 'green robot' operating system is the most appropriate platform to push hardware and software to its limits.
- How to report suspicious Android applicationsinstalling suspicious or malicious android applications on the device may jeopardize data and security. if you see a suspicious application and want to report it to google, here's how.
- Google: Play Protect helped cut 20% of malicious Android application installations by 2018to reschedule, google recently officially announced the security & privacy year in review report periodically. basically, this is an overall report that details how mountain view giants have made it more secure for more than 2 billion android devices worldwide.
- How to get money back when buying apps on Androidperhaps an app you buy doesn't work, or just simply doesn't like it anymore, wants to pay and receive refunds (refund) on google play store. but where to start? fortunately, like apple, this refund process is fast and simple.
- Detect spyware targeting iOS usersnetwork security researchers have recently discovered the ios version of a phone spy application, originally designed to target android devices through applications on google play store.
- The Joker malware once again bypassed Google's security, spreading strongly on the Play Storethe joker malware has been around since 2017, but google has so far struggled to detect and stop it.
- Most Android anti-virus software cannot detect malicious APK filesapk file containing malicious code is a method that hackers often use to attack android users. unlike ios, android users can download and install apps from third-party app stores or download the app's apk file and install it themselves.