Android Adware discovered in 100 Apps on the official Google Play Store

Android logoSecurity researchers have discovered 104 Android apps that exhibit a combination of adware and spyware features, collecting information on users in order to deliver malware to infected victims.

Detected by antivirus maker Dr.Web as Android.Spy.277, this malware family is distributed to its victims as Android apps directly from Google's official Play Store.

Most of these applications are blatant clones of more popular apps and games, and some of them don't even exhibit the functionality with which they were advertised.

Android Adware discovered in 100 Apps on the official Google Play Store

The apps range from image editing software to live (animated) wallpaper apps, and from simplistic games to instant messaging services. In total, the list is comprised of 104 apps, which have been downloaded and installed over 3.2 million times.

Dr.Web researchers say that, as soon as the malware finds its way on a device, it starts collecting the following information: IMEI code, the user's Google email, Android OS version, geolocation information, the user's phone number, technical device details, Google Cloud Messaging identifier (GCM id), information related to the user's network, root access availability, if the infected app has managed to get admin privileges, the presence of the Google Play Store app, and a few other more.

All this information is re-sent to the attacker's C&C server every time a user starts an app, along with the app's name. At this point in time, the malicious app requests instructions on what to do next.

The C&C server can tell it to show ads via interstitial pop-ups, via the notification panel, via the notification bar, or to place shortcuts on the user's home screen. These shortcuts and popups can open links inside the user's local browser, the Google Play Store, or the Facebook app.

Most of the ads try to scare users so they install other applications, possibly promoted via affiliate programs that allow the malware's author to earn money from their malicious campaign.

Android.Spy.277 is also trying to install other apps that contain the same infection, so in the case a user manages to discover from what app these ads are shown, if uninstalled, another one of its instances can take over.

Dr.Web says they notified Google, who started to remove some of the malicious applications. You can view the full list of infected apps below.

Source: Softpedia

Tags: Android, Google, security

Add comment

Your name:
Sign in with:
Your comment:

Enter code:

E-mail (not required)
E-mail will not be disclosed to the third party

Last news

Galaxy Note10 really is built around a 6.7-inch display
You may still be able to download your content
Facebook, Messenger and Instagram are all going away
Minimize apps to a floating, always-on-top bubble
Japan Display has been providing LCDs for the iPhone XR, the only LCD model in Apple’s 2018 line-up
The 2001 operating system has reached its lowest share level
The entire TSMC 5nm design infrastructure is available now from TSMC
The smartphone uses a Snapdragon 660 processor running Android 9 Pie
The Samsung Galaxy A5 (2017) Review
The evolution of the successful smartphone, now with a waterproof body and USB Type-C
February 7, 2017 / 2
Samsung Galaxy TabPro S - a tablet with the Windows-keyboard
The first Windows-tablet with the 12-inch display Super AMOLED
June 7, 2016 /
Keyboards for iOS
Ten iOS keyboards review
July 18, 2015 /
Samsung E1200 Mobile Phone Review
A cheap phone with a good screen
March 8, 2015 / 4
Creative Sound Blaster Z sound card review
Good sound for those who are not satisfied with the onboard solution
September 25, 2014 / 2
Samsung Galaxy Gear: Smartwatch at High Price
The first smartwatch from Samsung - almost a smartphone with a small body
December 19, 2013 /

News Archive



Do you use microSD card with your phone?
or leave your own version in comments (15)