More Adware-Delivering Android Games And Camera Apps Removed From Google Play Store

  •  
  •  
  •  
  • 1
  •  
  •  
  •  
    1
    Share

Researchers have discovered more malicious Android apps on the Play Store. They specifically noticed numerous adware-delivering Android games and camera apps that evaded Play Protect.

More Adware-Delivering Android Apps Found

Researchers from Trend Micro have reported multiple malicious apps targeting Android users with malware. Reportedly, they discovered 49 different adware-delivering Android games and camera apps with over 3 million downloads. These apps not only infected users but also utilised various security evasion features to bypass Play Protect.

As elaborated in their blog post, the apps, after installation, delivered full-screen ads on the devices. The ads provided no viable option to the users to close, compelling them to press back or home key.

Moreover, those apps also disguised their icons to bluff the users. The following image lists all 49 adware-delivering apps.

Adware-delivering Android apps
Source: Trend Micro

In addition, the apps also applied various behaviors to evade Google’s app vetting, including,

  • Heavy code obfuscation
  • Strings encryption with a custom algorithm
  • Adware shortcut disguised as a popular browser
  • Different actions based on Android versions
  • Registration as a foreground service to continue running with no user interaction
  • Prolonged delay time

Google Removed The Nasty Apps

Following Trend Micro’s report, Google removed all the apps from the Play Store.

Nonetheless, the threat is not over. In fact, it seems an ongoing battle between Play Store and malicious app developers considering the wave of adware-delivering apps.

Until now, hundreds of Android applications made it to the Play Store, targeted users with malware, and eventually got removed. Nonetheless, removing these apps does not effectively end this malicious campaign. The developers are smart enough to employ various tricks to evade Google’s app vetting processes.

Let us know your thoughts in the comments.

The following two tabs change content below.
Avatar

Abeerah Hashim

Abeerah has been a passionate blogger for several years with a particular interest towards science and technology. She is crazy to know everything about the latest tech developments. Knowing and writing about cybersecurity, hacking, and spying has always enchanted her. When she is not writing, what else can be a better pastime than web surfing and staying updated about the tech world! Reach out to me at: [email protected]
Avatar

Abeerah Hashim

Abeerah has been a passionate blogger for several years with a particular interest towards science and technology. She is crazy to know everything about the latest tech developments. Knowing and writing about cybersecurity, hacking, and spying has always enchanted her. When she is not writing, what else can be a better pastime than web surfing and staying updated about the tech world! Reach out to me at: [email protected]

Feel free to leave a comment

Do NOT follow this link or you will be banned from the site!