These 8 Android Apps on Play Retailer Comprise Android/FakeApp Trojan

Eight Android apps on the Google Play Retailer, downloaded by thousands and thousands, comprise the Android.FakeApp trojan, stealing consumer information – Right here’s the entire checklist, delete the NOW!

Russian cybersecurity agency Dr. Net has uncovered a number of Android apps on the Google Play Retailer that comprise a complicated trojan, Android.FakeApp.1669 (also called Android/FakeApp).

These apps, which declare to offer sensible capabilities like monetary instruments, planners, and recipe books; comprise a hidden payload that redirects customers to undesirable web sites, compromising their information. What’s worse, greater than 2 million customers have downloaded these contaminated apps from Google Play, unaware of the menace.

Malware on the official Google Play Retailer is nothing new. In truth, reviews from final month point out an increase in malicious apps on each the Apple App Retailer and Google Play Retailer.

One of many contaminated apps, with over 1 million downloads, has latest consumer feedback expressing frustration with its performance (Screenshot credit score: Hackread.com).

Android.FakeApp.1669

Android.FakeApp.1669 is a part of the Android.FakeApp trojan household, a bunch of malware that normally redirects customers to completely different web sites, disguised as reputable apps. Nevertheless, this variant is very notable on account of its reliance on a modified dnsjava library that enables it to obtain instructions from a malicious DNS server, which, in flip, provides a goal hyperlink. Quite than the app’s marketed perform, this goal hyperlink is displayed on the consumer’s display, usually pretending to be a web-based on line casino or an unrelated web site.

In response to Dr. Net’s report, the malware prompts solely below particular circumstances. If the contaminated system is linked to the Web via designated cell information suppliers, the DNS server will ship a configuration to the app, containing a hyperlink that masses inside the app’s WebView interface. When not linked to focused networks, the app capabilities as anticipated, making detection troublesome for customers.

In January 2018, the Android.FakeApp trojan was first found in a pretend Uber app for Android. Later, in March 2018, the identical malware focused Fb customers to steal information. In Could 2020, a pretend cell model of the sport Valorant was spreading the Android.FakeApp trojan simply because the official model was set to launch that summer time.

Contaminated Apps and Obtain Counts

These apps claimed to be helpful instruments, from private finance and productiveness functions to cooking and recipe collections. Nevertheless, as soon as launched, the apps would hook up with the DNS server to retrieve a configuration containing the web site hyperlink to show.

Dr. Net’s investigation revealed a number of apps on the Google Play Retailer, some with excessive obtain counts, contaminated by Android.FakeApp.1669. Whereas Google has eliminated a few of these apps, thousands and thousands of customers had already put in them earlier than the removing. Beneath is an inventory of apps recognized by Dr. Net’s malware analysts, with their respective obtain counts:

App Title Variety of Downloads
Cut up it: Checks and Ideas 1,000,000+ (On Google Play on the time of writing)
FlashPage parser 500,000+ (On Google Play on the time of writing)
BeYummy – your cookbook 100,000+ (On Google Play on the time of writing)
Memogen 100,000+ (Deleted)
Show Shifting Message 100,000+ (On Google Play on the time of writing)
WordCount 100,000+ (On Google Play on the time of writing)
Aim Achievement Planner 100,000+ (On Google Play on the time of writing)
DualText Examine 100,000+ (On Google Play on the time of writing)
Journey Memo 100,000+ (Deleted)
DessertDreams Recipes 50,000+ (On Google Play on the time of writing)
Rating Time 10,000+ (Deleted)

How Android.FakeApp.1669 Operates

As soon as downloaded, the trojan gathers particular information from the consumer’s system, comparable to:

  • Display screen measurement
  • Machine mannequin and model
  • Battery cost proportion
  • Developer settings standing
  • Machine ID, which incorporates the set up time and a random quantity.

This information, coded into a singular sub-domain title, permits the server to customise its response to every contaminated system. When the system meets the connection standards, Android.FakeApp.1669 retrieves and decrypts information from the DNS server, ultimately loading a hyperlink that redirects to an undesirable web site, sometimes a web-based on line casino.

The decryption course of includes reversing and decoding Base64 information and decompressing it, revealing delicate configuration particulars.

Suggestions for Customers

Given the excessive obtain depend, Android customers ought to take speedy steps to guard themselves. First, it’s essential to delete any contaminated apps. Uninstall any app from the checklist offered or different related apps that show suspicious behaviour to reduce potential safety dangers.

Moreover, learn the feedback on these apps; many customers have left destructive opinions, noting that the apps spam adverts and trigger their units to freeze, a behaviour that enables the malware to function within the background.

Subsequent, use trusted safety software program, repeatedly checking app permissions is one other important step. Customers ought to overview the permissions requested by apps, avoiding any pointless entry that would compromise system safety. Moreover, updating each the system and functions steadily will help stop sure forms of malware infections, as updates usually embrace vital safety patches.

Nonetheless, obtain with warning, even when utilizing official sources like Google Play. Reviewing app permissions and studying consumer suggestions earlier than downloading will help spot potential crimson flags and keep away from dangerous apps.

Hackread.com has reached out to Google, and this text can be up to date with any new developments or if Google removes the app. Keep tuned.

  1. First Cell Crypto Drainer on Google Play Steals $70K
  2. Spyware and adware Present in Google Play Retailer Apps, 2m Downloads
  3. Malware contaminated Minecraft modpacks hit Google Play Retailer
  4. 35 malicious apps discovered on Google Play, put in by 2m customers
  5. Google Removes Swing VPN Android App Uncovered as DDoS Botnet

Recent articles

INTERPOL Pushes for

î ‚Dec 18, 2024î „Ravie LakshmananCyber Fraud / Social engineering INTERPOL is...

Patch Alert: Essential Apache Struts Flaw Discovered, Exploitation Makes an attempt Detected

î ‚Dec 18, 2024î „Ravie LakshmananCyber Assault / Vulnerability Risk actors are...