Threats / 13 malware-ridden apps on Google Play Store enjoyed half-a-million downloads
13 malware-ridden apps on Google Play Store enjoyed half-a-million downloads
26 November 2018 |
Google recently kicked out 13 malicious apps from its official Play Store after a security researcher demonstrated that the apps had zero functionality and installed malware into victims' devices once launched.
According to researcher Lukas Sefanko, all thirteen driving-simulation apps on the Google Play Store enjoyed over 560,000 downloads in total and two of them, in fact, featured in the Trending section on the Play Store.
The apps, which are no longer present in the Play Store, were Truck Cargo Simulator, Extreme Car Driving, City Traffic Moto Racing, Moto Cross Extreme, Hyper Car Driving Simulator, Extreme Car Driving, FireFighter - Fire Truck Simulator, Car Driving Simulator, Extreme Sport Car, SUV 4x4 Driving Simulator, Luxury Cars SUV Simulator, Luxury Car Parking and SUV City Climb Parking.
Once downloaded and launched, the apps prompted users to install an additional .APK file dubbed Game Center, following which the apps hid themselves and displayed advertisements whenever the devices were unlocked.
At the time of installation, the apps also requested certain privileges such as full network access, access to network connections and access to Wi-Fi connections.
Malicious apps evaded detection by Google
Last year, Google introduced Google Play Protect, a malware-tracking software that, it said, would scan apps and devices for harmful behaviour and notify users if any security risks are found.
"All Google Play apps go through a rigorous security analysis even before they’re published on the Play Store—and Play Protect warns you about bad apps that are downloaded from other sources too. Play Protect watches out for any app that might step out of line on your device, keeping you and every other Android user safe," noted Google in a blog post.
Since the thirteen apps did not contain malware themselves but asked users to download a malware-ridden APK file from an external source, they could possibly have evaded Google's detection mechanisms when they were admitted to the Play Store.
Latest posts by Jay Jay (see all)
- HMD Global shifts its data centre from Singapore to Europe - 18th June 2019
- Danish DPA fines IDdesign £180,000 for illegally storing personal data of 385,000 customers - 17th June 2019
- Mermaids UK apologises for suffering “historical data breach” - 17th June 2019
- Home Secretary signs US’ extradition request for Julian Assange - 14th June 2019
- MI5 transgressed Investigatory Powers Act while handling citizen data - 14th June 2019