Read Time:1 Minute, 36 Second

Researchers have uncovered yet another group of what appear to be innocent Android apps built to spread malware to endpoints and charge unwitting victims for services.

The Dr Web antivirus team recently discovered a new batch of apps with 10 million downloads, including wallpaper apps, keyboards, photo editors, video editors, and the occasional cache cleaner or system maintenance app.

On the Google Play Store, 28 apps were found that had managed to circumvent Google’s stringent security policies.

These apps are being used to infect Android devices with malware that drains victims’ wallets by subscribing them to premium services,”  said a Dr Web specialist in a blog post detailing the research. “The malicious functionality is not immediately apparent in most cases.”

In terms of damages, the procedure is essentially the same. Most apps will try to hide once installed, changing their appearance in the app drawer to that of a system app. They hope that doing so will discourage users from uninstalling them. The apps would then push advertisements and attempt to sign the victim up for various premium services to generate additional revenue.

According to the investigation, this batch of virus software has been active since March and has successfully infected millions of devices.

These infected applications employ a technique known as “droppers.” This technology enables the infected app to bypass Google’s security defence system, bypass the Play Store, and infect the victim’s device in stages.

None of this would have been possible if users had not granted the apps the necessary permissions, even though the apps are simple in design (and do what they claim to do). They frequently ask users for advanced permissions, such as the permission to be excluded from the battery saver feature, so that they can operate in the background even when the user terminates them – a major red flag.

It is a lesson that everyone should be discerning when installing apps.

Happy
Happy
100 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
cow software Previous post Montana Ranchers Discovered Malware in a Cow Software Used in the Purported China Hack
water Next post A Bizarre Case of Mistaken Identity Has Seen a Water Company Hacked by Confused Cyber Crooks