{"id":10113,"date":"2022-08-23T09:17:50","date_gmt":"2022-08-23T09:17:50","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=10113"},"modified":"2022-08-23T09:17:50","modified_gmt":"2022-08-23T09:17:50","slug":"google-play-malware","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/google-play-malware\/","title":{"rendered":"Researchers Found 35 Malware on Google Play, Overall Installed 2,000,000 Times"},"content":{"rendered":"<h4>Bitdefender experts found 35 malware in the Google Play Store that distributed unwanted ads, and which users in total downloaded more than 2,000,000 times.<\/h4>\n<p>Let me remind you that we wrote that <a href=\"\/blogs\/about-8-of-apps-in-the-google-play-store-are-vulnerable-to-a-bug-in-the-play-core-library\/\">About 8% of apps in the <b>Google Play<\/b> Store are vulnerable to a bug in the Play Core library<\/a>, and also that <a href=\"\/blogs\/mandrake-malware-was-hiding-on-google-play-for-more-than-four-years\/\"><b>Mandrake<\/b> malware was hiding on Google Play for more than four years<\/a>.<\/p>\n<p>The researchers say the <a target=\"_blank\" href=\"https:\/\/www.bitdefender.com\/blog\/labs\/real-time-behavior-based-detection-on-android-reveal-dozens-of-malicious-apps-on-google-play-store\/\" rel=\"noopener nofollow\">apps followed the classic tactic<\/a> of luring users in by pretending to perform some specialized function, then changing their name and icon after installation, making them harder to find and remove later. As a rule, the malware changes the icon to a gear and renames itself into Settings, but sometimes it looks like <b>Motorola<\/b>, <b>Oppo<\/b> and <b>Samsung<\/b> system applications.<\/p>\n<p>After infiltrating the victim&#8217;s device, applications begin to display intrusive ads, abusing the <b>WebView<\/b>, and thereby generating ad revenue for their operators. Also, since these apps use their own ad loading framework, it is likely that additional malicious payloads could be delivered to the compromised device.<\/p>\n<p>The detected malware uses several methods of disguise, including trying to receive updates as late as possible in order to more reliably disguise itself on the device. In addition, if the victim does find suspicious Settings and opens them, a malicious application with a size of 0 is launched to hide from human eyes. The malware then opens the actual settings menu to make the user think they are running a real app.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/08\/malware-class.jpg\" alt=\"Google Play Malware\" title=\"\"><\/p>\n<p>Analysts also note that the malware uses complex obfuscation and encryption to make reverse engineering difficult and hide the main payload in two encrypted DEX files.<\/p>\n<p>The list of the most popular malicious applications (over 100,000 downloads) can be seen below. At the same time, it must be said that most of them have already been removed from the official Google store, but are still available in third-party app stores, including <b>APKSOS<\/b>, <b>APKAIO<\/b>, <b>APKCombo<\/b>, <b>APKPure<\/b> and <b>APKsfull<\/b>.<\/p>\n<ol>\n<li>Walls light \u2013 Wallpapers Pack (gb.packlivewalls.fournatewren);<\/li>\n<li>Big Emoji \u2013 Keyboard 5.0 (gb.blindthirty.funkeyfour);<\/li>\n<li>Grand Wallpapers \u2013 3D Backdrops 2.0 (gb.convenientsoftfiftyreal.threeborder);<\/li>\n<li>Engine Wallpapers (gb.helectronsoftforty.comlivefour);<\/li>\n<li>Stock Wallpapers (gb.fiftysubstantiated.wallsfour);<\/li>\n<li>EffectMania \u2013 Photo Editor 2.0 (gb.actualfifty.sevenelegantvideo);<\/li>\n<li>Art Filter \u2013 Deep Photoeffect 2.0 (gb.crediblefifty.editconvincingeight);<\/li>\n<li>Fast Emoji Keyboard APK (de.eightylamocenko.editioneights);<\/li>\n<li>Create Sticker for Whatsapp 2.0 (gb.convincingmomentumeightyverified.realgamequicksix);<\/li>\n<li>Math Solver \u2013 Camera Helper 2.0 (gb.labcamerathirty.mathcamera);<\/li>\n<li>Photopix Effects \u2013 Art Filter 2.0 (gb.mega.sixtyeffectcameravideo);<\/li>\n<li>Led Theme \u2013 Colorful Keyboard 2.0 (gb.theme.twentythreetheme);<\/li>\n<li>Animated Sticker Master 1.0 (am.asm.master);<\/li>\n<li>Sleep Sounds 1.0 (com.voice.sleep.sounds);<\/li>\n<li>Personality Charging Show 1.0 (com.charging.show);<\/li>\n<li>Image Warp Camera;<\/li>\n<li>GPS Location Finder (smart.ggps.lockakt).<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Bitdefender experts found 35 malware in the Google Play Store that distributed unwanted ads, and which users in total downloaded more than 2,000,000 times. Let me remind you that we wrote that About 8% of apps in the Google Play Store are vulnerable to a bug in the Play Core library, and also that Mandrake [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":10117,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[203,58,28],"class_list":{"0":"post-10113","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-bitdefender","9":"tag-google","10":"tag-malware"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/08\/Google-Play-Malware.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/10113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=10113"}],"version-history":[{"count":2,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/10113\/revisions"}],"predecessor-version":[{"id":10116,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/10113\/revisions\/10116"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/10117"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=10113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=10113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=10113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}