Hot topics

Downloaded One of These Dangerous Apps? Google Says Delete It Now

Google Play Store dangerous malware apps deleted
© Gemini for nextpit

With recent security upgrades to the Google Play Store, you’d expect it to block dangerous apps more effectively. But that’s not always the case. Google has just removed dozens of malware-laced apps from its platform, but only after they were downloaded more than 19 million times. This marks one of the largest malware infiltrations in recent memory.

The discovery was made by Zscaler’s ThreatLabz team during an investigation into a large-scale malware campaign targeting Android users. Many of the removed apps were found to contain the well-known banking trojan Anatsa, also known as TeaBot.

How Anatsa Malware Steals Your Data and Your Money

Anatsa was first documented in 2020. It was embedded in various fake and malicious apps and widely used to steal sensitive user data and banking credentials. The current report suggests the Trojan now targets over 830 banking, cryptocurrency, and digital wallet apps, with recent activity covering Germany and South Korea.

Hackers disguise these apps to appear legitimate when targeting vulnerable Android devices. Some examples of the trojan's disguises include PDF or document readers, wellness apps, and flashlight tools. One recent case involved an app called Document Reader – File Manager, published by a suspicious developer named orukov5 on the Play Store, and it had accumulated over a thousand installs before it was taken down.

Google Play Store page for 'Document Reader - File Manager' app, with download option and icons for various file types.
Malware apps may appear legitimate in the Google Play Store but contain hidden trojans. For example, a document reader app could execute remote code once installed on your device. / © Zscaler

Once installed, the app exploits accessibility loopholes to gain permissions. It then acts as a channel to download malicious payloads, such as execution codes, from remote servers via app updates. These are deployed silently to the affected device. Afterward, the malware begins scanning for installed banking apps, breaches their security, and steals information without the victim’s knowledge.

In some cases, it displays fake login screens to capture account credentials, similar to tactics used by the Hook malware. Attackers then use these stolen details to siphon funds from victims’ bank accounts.

File manager view showing storage usage and a prompt for app update on Android.
An example where the malware app will download 'payloads' containing the execution codes via an app update. / © Zscaler

Malwarebytes noted that Anatsa continues to evolve, bypassing new and advanced security safeguards. This makes it increasingly difficult to detect and block.

More Malware Threats: Joker and Harly

In addition to Anatsa, the security researchers also discovered other malware types, including Joker and Harly, being distributed through malicious apps. These are popular adware variants but are also capable of stealing information by reading messages and spying through screenshots and screen recordings.

According to Google, it has detected these threats and addressed the flaws by removing the apps. Affected users were reportedly alerted and advised to delete the apps from their devices.

How to Protect Your Device from Malware

This recent attack highlights how threats continue to evolve despite security enhancements from Google and Apple. Users are strongly advised to take proactive safety measures to protect their devices and data.

Even if an app appears legitimate, always check the publisher and number of downloads and avoid installing third-party apps outside the Play Store. At the same time, avoid granting permissions immediately, and be mindful of what access you're giving. In some cases, it's best to uninstall apps you no longer use.

It is also recommended to enable security settings like Google Play Protect, which is on by default. This feature scans apps during download and installation and alerts you to potential threats. Additionally, make sure your phone and core services are updated to the latest software version as it includes the most recent security fixes to vulnerabilities.

What protective measures do you suggest to other digital users? We want to hear your suggestions in the comments.

Via: Malwarebytes Source: Zscaler

Best Smart Speaker With Amazon Alexa 

  Editor's choice Best smart home control center Best price-performance ratio Best sound Best sound supplement Best display
Product
Product image Amazon Echo Dot (5. Gen) 2022 Product Image Amazon Echo Hub Product Image Amazon Echo (4.Gen) Product Image Amazon Echo Studio Product Image Amazon Echo Sub Product Image Amazon Echo Show 10 (3rd. Gen) Product Image
Review
Review: Amazon Echo Dot (5. Gen) 2022
Review: Amazon Echo Hub
Not yet tested
Review: Amazon Echo Studio
Not yet tested
Not yet tested
Price Compariosn
nextpit receives a commission for purchases made via the marked links. This has no influence on the editorial content and there are no costs for you. You can find out more about how we make money on our transparency page.
Go to comment (0)
Jade Bryan

Jade Bryan
Junior Editor

I still remember how amazed I was when I first got hold of the Nokia 3210 back when I was a kid, and it was during that time I developed my love for technology, particularly for mobile phones. I started sharing my knowledge through writing in different blogs and forums back in Nokia Nseries era. I even make videos before where I put different phones side-by-side. Today, I'm still an avid enthusiast of smartphones, but my interests have evolved into smart devices and electric vehicles.

To the author profile
Liked this article? Share now!
Recommended articles
Latest articles
Push notification Next article
No comments
Write new comment:
All changes will be saved. No drafts are saved when editing
Write new comment:
All changes will be saved. No drafts are saved when editing