{"id":23346,"date":"2023-11-09T07:30:04","date_gmt":"2023-11-09T15:30:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/11\/09\/news-17076\/"},"modified":"2023-11-09T07:30:04","modified_gmt":"2023-11-09T15:30:04","slug":"news-17076","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/11\/09\/news-17076\/","title":{"rendered":"Google Play malware clocks up more than 600 million downloads in 2023 | Kaspersky official blog"},"content":{"rendered":"<p><strong>Credit to Author: Alanna Titterington| Date: Thu, 09 Nov 2023 14:36:58 +0000<\/strong><\/p>\n<p>Users tend to think it&#8217;s safe to install apps from Google Play. After all, it&#8217;s the most official of all official stores for Android, and all apps there are thoroughly vetted by Google moderators, right?<\/p>\n<p>Bear in mind, however, that Google Play is home to <a href=\"https:\/\/www.businessofapps.com\/guide\/app-stores-list\/\" target=\"_blank\" rel=\"nofollow noopener\">more than three million unique apps<\/a>, most of which get updated regularly, and to vet all of them thoroughly \u2014 that is, <em>really <\/em>thoroughly \u2014 is beyond the resources of even one of the world&#8217;s largest corporations.<\/p>\n<p>Well aware of this, makers of malicious apps have developed a number of techniques to sneak their creations onto Google Play. In this post, we take a look at the most headline-grabbing cases of 2023 regarding malicious apps on the official Android store, with total downloads in excess of \u2014 wait for it \u2014 600 million. Let&#8217;s go!&#8230;<\/p>\n<h2>50,000 downloads: infected iRecorder app eavesdrops on users<\/h2>\n<p>Let&#8217;s start with the fairly minor, but quite interesting and highly illustrative case of iRecorder. This unremarkable screen-recording app for Android smartphones was uploaded to Google Play in September 2021.<\/p>\n<p>But then, in August 2022, its developers added some malicious functionality: code from the remote access Trojan AhMyth, which caused the smartphones of all users who had installed the app to record sound from the microphone every 15 minutes and send it to the server of the app creators. By the time <a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/05\/app-with-50000-google-play-installs-sent-attackers-mic-recordings-every-15-minutes\/\" target=\"_blank\" rel=\"nofollow noopener\">researchers discovered the malware<\/a> in May 2023, the iRecorder app had been downloaded more than 50,000 times.<\/p>\n<p>This example demonstrates one of the ways in which malicious apps creep into Google Play. First, cybercriminals upload an innocuous app to the store that&#8217;s guaranteed to sail through all moderation checks. Then, when the app has built an audience and some kind of reputation (which can take months or even years), it&#8217;s augmented with malicious functionality in its next update uploaded to Google Play.<\/p>\n<h2>620,000 downloads: Fleckpe subscription Trojan<\/h2>\n<p>Also in May 2023, our experts <a href=\"https:\/\/securelist.com\/fleckpe-a-new-family-of-trojan-subscribers-on-google-play\/109643\/\" target=\"_blank\" rel=\"noopener\">found several apps on Google Play<\/a> infected with the Fleckpe subscription Trojan. By that time, they&#8217;d already chalked up 620,000 installs. Interestingly, these apps were uploaded by different developers. And this is another common tactic: cybercriminals create numerous developer accounts in the store so that even if some get blocked by the moderators they can just upload a similar app to another account.<\/p>\n<div id=\"attachment_49584\" style=\"width: 939px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092309\/malware-in-google-play-2023-01.jpg\"><img aria-describedby=\"caption-attachment-49584\" decoding=\"async\" fetchpriority=\"high\" class=\"size-full wp-image-49584\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092309\/malware-in-google-play-2023-01.jpg\" alt=\"Apps on Google Play infected with the Fleckpe subscription Trojan\" width=\"929\" height=\"1428\" \/><\/a><\/p>\n<p id=\"caption-attachment-49584\" class=\"wp-caption-text\">Apps on Google Play infected with the Fleckpe subscription Trojan<\/p>\n<\/div>\n<p>When the infected app was run, the main malicious payload was downloaded to the victim&#8217;s smartphone, after which the Trojan connected to the command-and-control server and transferred country and cellular operator information. Based on this information, the server provided instructions on how to proceed. Fleckpe then opened web pages with paid subscriptions in a browser window invisible to the user, and by intercepting confirmation codes from incoming notifications subscribed the user to needless services paid for through the cellular operator account.<\/p>\n<h2>1.5 million downloads: Chinese spyware<\/h2>\n<p>In July 2023, Google Play was <a href=\"https:\/\/thehackernews.com\/2023\/07\/two-spyware-apps-on-google-play-with-15.html\" target=\"_blank\" rel=\"nofollow noopener\">found to be hosting<\/a> two file managers \u2014 one with one million downloads, the other with half a million. Despite the developers&#8217; assurances that the apps don&#8217;t collect any data, researchers found that both transmitted a lot of user information to servers in China, including contacts, real-time geolocation, data about the smartphone model and cellular network, photos, audio and video files, and more.<\/p>\n<div id=\"attachment_49583\" style=\"width: 1544px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092308\/malware-in-google-play-2023-02.jpg\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-49583\" decoding=\"async\" class=\"size-full wp-image-49583\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092308\/malware-in-google-play-2023-02.jpg\" alt=\"File managers on Google Play infected with spyware\" width=\"1534\" height=\"640\" \/><\/a><\/p>\n<p id=\"caption-attachment-49583\" class=\"wp-caption-text\">File managers on Google Play with Chinese spyware inside. <a href=\"https:\/\/thehackernews.com\/2023\/07\/two-spyware-apps-on-google-play-with-15.html\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<p>To avoid being uninstalled by the user, the infected apps hid their desktop icons \u2014 another common tactic used by mobile malware creators.<\/p>\n<h2>2.5 million downloads: background adware<\/h2>\n<p>In a recent case of malware detection on Google Play in August 2023, researchers <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-play-apps-with-25m-installs-load-ads-when-screens-off\/\" target=\"_blank\" rel=\"nofollow noopener\">found<\/a> as many as 43 apps \u2014 including, among others, TV\/DMB Player, Music Downloader, News, and Calendar \u2014 that secretly loaded ads when the user&#8217;s smartphone screen was off.<\/p>\n<div id=\"attachment_49581\" style=\"width: 314px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092304\/malware-in-google-play-2023-03.png\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-49581\" decoding=\"async\" class=\"size-full wp-image-49581\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092304\/malware-in-google-play-2023-03.png\" alt=\"Apps on Google Play displayed ads in secret\" width=\"304\" height=\"313\" \/><\/a><\/p>\n<p id=\"caption-attachment-49581\" class=\"wp-caption-text\">Some of the apps with hidden adware. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-play-apps-with-25m-installs-load-ads-when-screens-off\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<p>So as to be able to carry out their business in the background, the apps requested the user to add them to the list of power-saving exclusions. Naturally, affected users experienced reduced battery life. These apps had a combined total of 2.5 million downloads, and the target audience was primarily Korean.<\/p>\n<h2>20 million downloads: scammy apps promise rewards<\/h2>\n<p>A study published in early 2023 revealed <a href=\"https:\/\/www.phonearena.com\/news\/avoid-these-scammy-play-store-apps_id145237\" target=\"_blank\" rel=\"nofollow noopener\">several shady apps<\/a> on Google Play with more than 20 million downloads between them. Positioning themselves primarily as health trackers, they promised users cash rewards for walking and other activities, as well as for viewing ads or installing other apps.<\/p>\n<div id=\"attachment_49585\" style=\"width: 2380px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092312\/malware-in-google-play-2023-04.png\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-49585\" decoding=\"async\" class=\"size-full wp-image-49585\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092312\/malware-in-google-play-2023-04.png\" alt=\"Scam apps on Google Play promising payouts for walking and viewing ads\" width=\"2370\" height=\"911\" \/><\/a><\/p>\n<p id=\"caption-attachment-49585\" class=\"wp-caption-text\">Apps on Google Play promising rewards for walking and viewing ads. <a href=\"https:\/\/www.phonearena.com\/news\/avoid-these-scammy-play-store-apps_id145237\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<p>More precisely, the user was awarded points for these actions, which could then supposedly be converted into real money. The only trouble was that to get a reward, you had to amass such a huge number of points that it was effectively impossible.<\/p>\n<h2>35 million downloads: Minecraft clones with adware inside<\/h2>\n<p>Google Play also became home to malicious games this year, with the main culprit (and <a href=\"https:\/\/www.kaspersky.com\/blog\/minecraft-mod-adware-google-play-revisited\/40202\/\" target=\"_blank\" rel=\"noopener\">not for the first time<\/a>) being Minecraft \u2014 still one of the most popular titles in the world. In April 2023, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/android-minecraft-clones-with-35m-downloads-infect-users-with-adware\/\" target=\"_blank\" rel=\"nofollow noopener\">38 Minecraft clones were detected<\/a> in the official Android store, with a total of 35 million downloads. Hidden inside these apps was adware called, appropriately enough, HiddenAds.<\/p>\n<div id=\"attachment_49582\" style=\"width: 1702px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092310\/malware-in-google-play-2023-05.jpg\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-49582\" decoding=\"async\" class=\"size-full wp-image-49582\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092310\/malware-in-google-play-2023-05.jpg\" alt=\"Adware-infected Minecraft clone on Google Play\" width=\"1692\" height=\"853\" \/><\/a><\/p>\n<p id=\"caption-attachment-49582\" class=\"wp-caption-text\">Block Box Master Diamond \u2014 the most popular of the Minecraft clones infected by HiddenAds. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/android-minecraft-clones-with-35m-downloads-infect-users-with-adware\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<p>When the infected apps were launched, they &#8220;displayed&#8221; hidden ads without the user&#8217;s knowledge. That didn&#8217;t pose a serious threat per se, but such behavior could have affect device performance and battery life.<\/p>\n<p>And those infected apps could always be followed up later by a far less harmless monetization scheme. This is another standard tactic of Android malware app creators: they readily switch between different types of malicious activity depending on what&#8217;s profitable at any given moment.<\/p>\n<h2>100\u00a0million downloads: data harvesting and click fraud<\/h2>\n<p>Also in April 2023, <a href=\"https:\/\/thehackernews.com\/2023\/04\/goldoson-android-malware-infects-over.html\" target=\"_blank\" rel=\"nofollow noopener\">another 60 apps<\/a> were found on Google Play infected with adware that researchers dubbed Goldoson. These apps collectively had more than 100 million downloads on Google Play and a further eight million on the popular Korean <a href=\"https:\/\/www.onestorecorp.com\/en\/about\/osc\/\" target=\"_blank\" rel=\"nofollow noopener\">ONE store<\/a>.<\/p>\n<p>This malware also &#8220;showed&#8221; hidden ads by opening web pages within the app in the background. In addition, the malicious apps collected user data \u2014 including information about installed apps, geolocation, addresses of devices connected to the smartphone via Wi-Fi and Bluetooth, and more.<\/p>\n<p>Goldoson seems to have gotten into all these apps along with an infected library used by many legitimate developers that were simply unaware that it contained malicious functionality. And this isn&#8217;t an uncommon occurrence: often malware creators don&#8217;t develop and publish apps on Google Play themselves, but instead create infected libraries of this kind that end up in the store along with other developers&#8217; apps.<\/p>\n<h2>451 million downloads: mini-game ads and data harvesting<\/h2>\n<p>We close with the biggest case of the year: in May 2023, a team of researchers <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/android-apps-with-spyware-installed-421-million-times-from-google-play\/\" target=\"_blank\" rel=\"nofollow noopener\">found<\/a> a whopping 101 infected apps on Google Play, with combined downloads of 421 million. Lurking inside each and every one of them was malware called SpinOk.<\/p>\n<p>Shortly after that, another team of researchers discovered <a href=\"https:\/\/www.tomsguide.com\/news\/android-apps-with-30-million-downloads-contain-spinok-android-malware-delete-these-now\" target=\"_blank\" rel=\"nofollow noopener\">92 more apps<\/a> on Google Play infected with the same SpinOk, with a slightly more modest number of downloads \u2014 30\u00a0million. In total, almost 200 infected apps were found with 451 million downloads from Google Play. This is another case of apps being infected through a malicious library.<\/p>\n<div id=\"attachment_49586\" style=\"width: 1660px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092310\/malware-in-google-play-2023-06.jpg\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-49586\" decoding=\"async\" class=\"size-full wp-image-49586\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092310\/malware-in-google-play-2023-06.jpg\" alt=\"Mini-games advertised by SpinOk\" width=\"1650\" height=\"1129\" \/><\/a><\/p>\n<p id=\"caption-attachment-49586\" class=\"wp-caption-text\">Mini-games promising &#8220;rewards&#8221; that SpinOk-infected apps show to users. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/android-apps-with-spyware-installed-421-million-times-from-google-play\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p>\n<\/div>\n<p>On the surface, the infected apps&#8217; task was to display intrusive mini-games promising cash rewards. But that wasn&#8217;t all: in the background, the malicious library was busy collecting and sending user data and files to the attackers&#8217; command-and-control server.<\/p>\n<h2>How to guard against malware on Google Play<\/h2>\n<p>Of course, we haven&#8217;t covered all the cases of malicious apps getting onto Google Play in 2023 \u2014 only the most eye-catching. The main takeaway from this post is this: malware on Google Play is far more common than any of us would like to think \u2014 infected apps have a combined download total in excess of half a billion!<\/p>\n<p>Nevertheless, official stores remain by far the safest sources. Downloading apps elsewhere is far more dangerous, for which reason we <a href=\"https:\/\/www.kaspersky.com\/blog\/unknown-apps-android\/41656\/\" target=\"_blank\" rel=\"noopener\">strongly advise against it<\/a>. But you must exercise caution in official stores as well:<\/p>\n<ul>\n<li>Every time you download a new app, carefully check its page in the store to make sure it&#8217;s genuine. Pay particular attention to the name of the developer. It&#8217;s not unusual for cybercriminals to clone popular apps and place them on Google Play under similar names, icons, and descriptions to lure users.<\/li>\n<li>Don&#8217;t be guided by the app&#8217;s overall rating, since this is easy to inflate. Rave reviews are also no trouble to fake. Instead, focus on negative reviews with low ratings \u2014 that&#8217;s where you can usually find a description of all the problems with the app.<\/li>\n<li>Make sure to install a <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&#038;c=ww_kdailyplaceholder\" target=\"_blank\">reliable protection<\/a> on all your Android devices, which gives an advance warning if a Trojan tries to sneak onto your smartphone or tablet.<\/li>\n<li>In the free version of our <a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&#038;c=ww_kdailyplaceholder\" target=\"_blank\">Kaspersky: Antivirus &#038; VPN<\/a> application, remember to manually run a device scan from time to time, and be sure to perform an antivirus scan <em>after<\/em> installing any new app and <em>before<\/em> launching it for the first time.<\/li>\n<li>In the paid version of our protection suite \u2014 which, incidentally, is included in a subscription to <a href=\"https:\/\/www.kaspersky.com\/standard?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kstand___\" target=\"_blank\">Kaspersky Standard<\/a>, <a href=\"https:\/\/www.kaspersky.com\/plus?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\">Kaspersky Plus<\/a> or <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\">Kaspersky Premium<\/a> \u2014 scanning is performed automatically, keeping you safe from infected apps.<\/li>\n<\/ul>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/malware-in-google-play-2023\/49579\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092212\/malware-in-google-play-2023-featured.jpg\"\/><\/p>\n<p><strong>Credit to Author: Alanna Titterington| Date: Thu, 09 Nov 2023 14:36:58 +0000<\/strong><\/p>\n<p>he most high-profile cases of malicious apps detected on Google Play in 2023, how they\u2019ve harmed users, and how to guard against this threat.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[11147,10468,10462,11268,22744,5897,10443,4053,10438,12269],"class_list":["post-23346","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-advertising","tag-adware","tag-android","tag-google-play","tag-paid-subscriptions","tag-privacy","tag-spyware","tag-surveillance","tag-threats","tag-trojans"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23346"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23346\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23346"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}