{"id":49579,"date":"2023-11-09T09:36:58","date_gmt":"2023-11-09T14:36:58","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=49579"},"modified":"2023-11-14T05:05:49","modified_gmt":"2023-11-14T10:05:49","slug":"malware-in-google-play-2023","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/malware-in-google-play-2023\/49579\/","title":{"rendered":"Google Play malware clocks up more than 600 million downloads in 2023"},"content":{"rendered":"<p>Users tend to think it\u2019s safe to install apps from Google Play. After all, it\u2019s the most official of all official stores for Android, and all apps there are thoroughly vetted by Google moderators, right?<\/p>\n<p>Bear in mind, however, that Google Play is home to <a href=\"https:\/\/www.businessofapps.com\/guide\/app-stores-list\/\" target=\"_blank\" rel=\"nofollow noopener\">more than three million unique apps<\/a>, most of which get updated regularly, and to vet all of them thoroughly \u2014 that is, <em>really <\/em>thoroughly \u2014 is beyond the resources of even one of the world\u2019s largest corporations.<\/p>\n<p>Well aware of this, makers of malicious apps have developed a number of techniques to sneak their creations onto Google Play. In this post, we take a look at the most headline-grabbing cases of 2023 regarding malicious apps on the official Android store, with total downloads in excess of \u2014 wait for it \u2014 600 million. Let\u2019s go!\u2026<\/p>\n<h2>50,000 downloads: infected iRecorder app eavesdrops on users<\/h2>\n<p>Let\u2019s start with the fairly minor, but quite interesting and highly illustrative case of iRecorder. This unremarkable screen-recording app for Android smartphones was uploaded to Google Play in September 2021.<\/p>\n<p>But then, in August 2022, its developers added some malicious functionality: code from the remote access Trojan AhMyth, which caused the smartphones of all users who had installed the app to record sound from the microphone every 15 minutes and send it to the server of the app creators. By the time <a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/05\/app-with-50000-google-play-installs-sent-attackers-mic-recordings-every-15-minutes\/\" target=\"_blank\" rel=\"nofollow noopener\">researchers discovered the malware<\/a> in May 2023, the iRecorder app had been downloaded more than 50,000 times.<\/p>\n<p>This example demonstrates one of the ways in which malicious apps creep into Google Play. First, cybercriminals upload an innocuous app to the store that\u2019s guaranteed to sail through all moderation checks. Then, when the app has built an audience and some kind of reputation (which can take months or even years), it\u2019s augmented with malicious functionality in its next update uploaded to Google Play.<\/p>\n<h2>620,000 downloads: Fleckpe subscription Trojan<\/h2>\n<p>Also in May 2023, our experts <a href=\"https:\/\/securelist.com\/fleckpe-a-new-family-of-trojan-subscribers-on-google-play\/109643\/\" target=\"_blank\" rel=\"noopener\">found several apps on Google Play<\/a> infected with the Fleckpe subscription Trojan. By that time, they\u2019d already chalked up 620,000 installs. Interestingly, these apps were uploaded by different developers. And this is another common tactic: cybercriminals create numerous developer accounts in the store so that even if some get blocked by the moderators they can just upload a similar app to another account.<\/p>\n<div id=\"attachment_49584\" style=\"width: 939px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092309\/malware-in-google-play-2023-01.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-49584\" class=\"size-full wp-image-49584\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092309\/malware-in-google-play-2023-01.jpg\" alt=\"Apps on Google Play infected with the Fleckpe subscription Trojan\" width=\"929\" height=\"1428\"><\/a><p id=\"caption-attachment-49584\" class=\"wp-caption-text\">Apps on Google Play infected with the Fleckpe subscription Trojan<\/p><\/div>\n<p>When the infected app was run, the main malicious payload was downloaded to the victim\u2019s smartphone, after which the Trojan connected to the command-and-control server and transferred country and cellular operator information. Based on this information, the server provided instructions on how to proceed. Fleckpe then opened web pages with paid subscriptions in a browser window invisible to the user, and by intercepting confirmation codes from incoming notifications subscribed the user to needless services paid for through the cellular operator account.<\/p>\n<h2>1.5 million downloads: Chinese spyware<\/h2>\n<p>In July 2023, Google Play was <a href=\"https:\/\/thehackernews.com\/2023\/07\/two-spyware-apps-on-google-play-with-15.html\" target=\"_blank\" rel=\"nofollow noopener\">found to be hosting<\/a> two file managers \u2014 one with one million downloads, the other with half a million. Despite the developers\u2019 assurances that the apps don\u2019t collect any data, researchers found that both transmitted a lot of user information to servers in China, including contacts, real-time geolocation, data about the smartphone model and cellular network, photos, audio and video files, and more.<\/p>\n<div id=\"attachment_49583\" style=\"width: 1544px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092308\/malware-in-google-play-2023-02.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-49583\" class=\"size-full wp-image-49583\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092308\/malware-in-google-play-2023-02.jpg\" alt=\"File managers on Google Play infected with spyware\" width=\"1534\" height=\"640\"><\/a><p id=\"caption-attachment-49583\" class=\"wp-caption-text\">File managers on Google Play with Chinese spyware inside. <a href=\"https:\/\/thehackernews.com\/2023\/07\/two-spyware-apps-on-google-play-with-15.html\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>To avoid being uninstalled by the user, the infected apps hid their desktop icons \u2014 another common tactic used by mobile malware creators.<\/p>\n<h2>2.5 million downloads: background adware<\/h2>\n<p>In a recent case of malware detection on Google Play in August 2023, researchers <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-play-apps-with-25m-installs-load-ads-when-screens-off\/\" target=\"_blank\" rel=\"nofollow noopener\">found<\/a> as many as 43 apps \u2014 including, among others, TV\/DMB Player, Music Downloader, News, and Calendar \u2014 that secretly loaded ads when the user\u2019s smartphone screen was off.<\/p>\n<div id=\"attachment_49581\" style=\"width: 314px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092304\/malware-in-google-play-2023-03.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-49581\" class=\"size-full wp-image-49581\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092304\/malware-in-google-play-2023-03.png\" alt=\"Apps on Google Play displayed ads in secret\" width=\"304\" height=\"313\"><\/a><p id=\"caption-attachment-49581\" class=\"wp-caption-text\">Some of the apps with hidden adware. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-play-apps-with-25m-installs-load-ads-when-screens-off\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>So as to be able to carry out their business in the background, the apps requested the user to add them to the list of power-saving exclusions. Naturally, affected users experienced reduced battery life. These apps had a combined total of 2.5 million downloads, and the target audience was primarily Korean.<\/p>\n<h2>20 million downloads: scammy apps promise rewards<\/h2>\n<p>A study published in early 2023 revealed <a href=\"https:\/\/www.phonearena.com\/news\/avoid-these-scammy-play-store-apps_id145237\" target=\"_blank\" rel=\"nofollow noopener\">several shady apps<\/a> on Google Play with more than 20 million downloads between them. Positioning themselves primarily as health trackers, they promised users cash rewards for walking and other activities, as well as for viewing ads or installing other apps.<\/p>\n<div id=\"attachment_49585\" style=\"width: 2380px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092312\/malware-in-google-play-2023-04.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-49585\" class=\"size-full wp-image-49585\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092312\/malware-in-google-play-2023-04.png\" alt=\"Scam apps on Google Play promising payouts for walking and viewing ads\" width=\"2370\" height=\"911\"><\/a><p id=\"caption-attachment-49585\" class=\"wp-caption-text\">Apps on Google Play promising rewards for walking and viewing ads. <a href=\"https:\/\/www.phonearena.com\/news\/avoid-these-scammy-play-store-apps_id145237\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>More precisely, the user was awarded points for these actions, which could then supposedly be converted into real money. The only trouble was that to get a reward, you had to amass such a huge number of points that it was effectively impossible.<\/p>\n<h2>35 million downloads: Minecraft clones with adware inside<\/h2>\n<p>Google Play also became home to malicious games this year, with the main culprit (and <a href=\"https:\/\/www.kaspersky.com\/blog\/minecraft-mod-adware-google-play-revisited\/40202\/\" target=\"_blank\" rel=\"noopener nofollow\">not for the first time<\/a>) being Minecraft \u2014 still one of the most popular titles in the world. In April 2023, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/android-minecraft-clones-with-35m-downloads-infect-users-with-adware\/\" target=\"_blank\" rel=\"nofollow noopener\">38 Minecraft clones were detected<\/a> in the official Android store, with a total of 35 million downloads. Hidden inside these apps was adware called, appropriately enough, HiddenAds.<\/p>\n<div id=\"attachment_49582\" style=\"width: 1702px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092310\/malware-in-google-play-2023-05.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-49582\" class=\"size-full wp-image-49582\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092310\/malware-in-google-play-2023-05.jpg\" alt=\"Adware-infected Minecraft clone on Google Play\" width=\"1692\" height=\"853\"><\/a><p id=\"caption-attachment-49582\" class=\"wp-caption-text\">Block Box Master Diamond \u2014 the most popular of the Minecraft clones infected by HiddenAds. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/android-minecraft-clones-with-35m-downloads-infect-users-with-adware\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>When the infected apps were launched, they \u201cdisplayed\u201d hidden ads without the user\u2019s knowledge. That didn\u2019t pose a serious threat per se, but such behavior could have affect device performance and battery life.<\/p>\n<p>And those infected apps could always be followed up later by a far less harmless monetization scheme. This is another standard tactic of Android malware app creators: they readily switch between different types of malicious activity depending on what\u2019s profitable at any given moment.<\/p>\n<h2>100\u00a0million downloads: data harvesting and click fraud<\/h2>\n<p>Also in April 2023, <a href=\"https:\/\/thehackernews.com\/2023\/04\/goldoson-android-malware-infects-over.html\" target=\"_blank\" rel=\"nofollow noopener\">another 60 apps<\/a> were found on Google Play infected with adware that researchers dubbed Goldoson. These apps collectively had more than 100 million downloads on Google Play and a further eight million on the popular Korean <a href=\"https:\/\/www.onestorecorp.com\/en\/about\/osc\/\" target=\"_blank\" rel=\"nofollow noopener\">ONE store<\/a>.<\/p>\n<p>This malware also \u201cshowed\u201d hidden ads by opening web pages within the app in the background. In addition, the malicious apps collected user data \u2014 including information about installed apps, geolocation, addresses of devices connected to the smartphone via Wi-Fi and Bluetooth, and more.<\/p>\n<p>Goldoson seems to have gotten into all these apps along with an infected library used by many legitimate developers that were simply unaware that it contained malicious functionality. And this isn\u2019t an uncommon occurrence: often malware creators don\u2019t develop and publish apps on Google Play themselves, but instead create infected libraries of this kind that end up in the store along with other developers\u2019 apps.<\/p>\n<h2>451 million downloads: mini-game ads and data harvesting<\/h2>\n<p>We close with the biggest case of the year: in May 2023, a team of researchers <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/android-apps-with-spyware-installed-421-million-times-from-google-play\/\" target=\"_blank\" rel=\"nofollow noopener\">found<\/a> a whopping 101 ineligible apps on Google Play, with combined downloads of 421 million. Lurking inside each and every one of them was a SpinOk code library.<\/p>\n<p>Shortly after that, another team of researchers discovered <a href=\"https:\/\/www.tomsguide.com\/news\/android-apps-with-30-million-downloads-contain-spinok-android-malware-delete-these-now\" target=\"_blank\" rel=\"nofollow noopener\">92 more apps<\/a> on Google Play with the same SpinOk library, with a slightly more modest number of downloads \u2014 30 million. In all almost 200 apps containing SpinOK code were found, with a total of 451 million downloads from Google Play between them. This is another case where dangerous code was delivered into applications from a third-party library.<\/p>\n<div id=\"attachment_49586\" style=\"width: 1660px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092310\/malware-in-google-play-2023-06.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-49586\" class=\"size-full wp-image-49586\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2023\/11\/09092310\/malware-in-google-play-2023-06.jpg\" alt=\"Mini-games advertised by SpinOk\" width=\"1650\" height=\"1129\"><\/a><p id=\"caption-attachment-49586\" class=\"wp-caption-text\">Mini-games promising \u201crewards\u201d that showed users applications containing SpinOk code. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/android-apps-with-spyware-installed-421-million-times-from-google-play\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>On the surface, the infected apps\u2019 task was to display intrusive mini-games promising cash rewards. But that wasn\u2019t all: the SpinOK library had the ability to collect and send user data and files to its developers\u2019 command-and-control server in the background.<\/p>\n<h2>How to guard against malware on Google Play<\/h2>\n<p>Of course, we haven\u2019t covered all the cases of malicious apps getting onto Google Play in 2023 \u2014 only the most eye-catching. The main takeaway from this post is this: malware on Google Play is far more common than any of us would like to think \u2014 infected apps have a combined download total in excess of half a billion!<\/p>\n<p>Nevertheless, official stores remain by far the safest sources. Downloading apps elsewhere is far more dangerous, for which reason we <a href=\"https:\/\/www.kaspersky.com\/blog\/unknown-apps-android\/41656\/\" target=\"_blank\" rel=\"noopener nofollow\">strongly advise against it<\/a>. But you must exercise caution in official stores as well:<\/p>\n<ul>\n<li>Every time you download a new app, carefully check its page in the store to make sure it\u2019s genuine. Pay particular attention to the name of the developer. It\u2019s not unusual for cybercriminals to clone popular apps and place them on Google Play under similar names, icons, and descriptions to lure users.<\/li>\n<li>Don\u2019t be guided by the app\u2019s overall rating, since this is easy to inflate. Rave reviews are also no trouble to fake. Instead, focus on negative reviews with low ratings \u2014 that\u2019s where you can usually find a description of all the problems with the app.<\/li>\n<li>Make sure to install a <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">reliable protection<\/a> on all your Android devices, which gives an advance warning if a Trojan tries to sneak onto your smartphone or tablet.<\/li>\n<li>In the free version of our <a href=\"https:\/\/www.kaspersky.com\/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky for Android<\/a> application, remember to manually run a device scan from time to time, and be sure to perform an antivirus scan <em>after<\/em> installing any new app and <em>before<\/em> launching it for the first time.<\/li>\n<li>In the paid version of our protection suite \u2014 which, incidentally, is included in a subscription to <a href=\"https:\/\/www.kaspersky.com\/standard?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kstand___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Standard<\/a>, <a href=\"https:\/\/www.kaspersky.com\/plus?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Plus<\/a> or <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a> \u2014 scanning is performed automatically, keeping you safe from infected apps.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>A look at some recent cases of Android malware infiltrating the most official of official app stores \u2014 Google Play.<\/p>\n","protected":false},"author":2726,"featured_media":49580,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[810,572,105,183,3459,43,714,768,422,723],"class_list":{"0":"post-49579","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-ads","9":"tag-adware","10":"tag-android","11":"tag-google-play","12":"tag-paid-subscriptions","13":"tag-privacy","14":"tag-spyware","15":"tag-surveillance","16":"tag-threats","17":"tag-trojans"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/malware-in-google-play-2023\/49579\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/malware-in-google-play-2023\/26621\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/malware-in-google-play-2023\/22047\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/malware-in-google-play-2023\/29356\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/malware-in-google-play-2023\/26904\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/malware-in-google-play-2023\/26836\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/malware-in-google-play-2023\/29356\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/malware-in-google-play-2023\/28186\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/malware-in-google-play-2023\/36526\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/malware-in-google-play-2023\/21220\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/malware-in-google-play-2023\/21985\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/malware-in-google-play-2023\/30663\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/malware-in-google-play-2023\/27174\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/malware-in-google-play-2023\/32899\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/malware-in-google-play-2023\/32547\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/49579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=49579"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/49579\/revisions"}],"predecessor-version":[{"id":49632,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/49579\/revisions\/49632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/49580"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=49579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=49579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=49579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}