android malware

Half a million Android users downloaded malware from Google Play Store

More than 5 lakhs users have installed Android Malware through driving games available on Google’s own App Store.

Lukas Stefanko, Security Researcher at ESET, tweeted details of 13 gaming applications along with the App functionality demonstration.

Consolidated, the applications outperformed 580,000 installs before Google pulled the attachment.

Anybody downloading the applications was expecting a truck or vehicle driving amusement. Rather, they persuaded what seemed, by all accounts, to be a buggy application that crashed each time it opened.


In actuality, the application was downloading a payload from another space — enrolled to an application developer in Istanbul — and introduced malware off camera, erasing the application’s icon simultaneously.

It’s not clear precisely what the malignant applications do; none of the malware scanners appeared to concede to what the bug does, in view of a transferred test to VirusTotal.

What is clear is that the malware has industriousness — propelling each time the Android telephone or tablet is begun up and has “full access” to its system activity, which the bug creator can use to take privileged insights.

Google has invested years attempting to twofold down on Android security by including better security highlights and more granular application authorization controls. Be that as it may, the organization keeps on engaging maverick and malevolent applications in the Google Play application store, which have assumed control as one of the best dangers to Android client security.

Google pulled in excess of 700,000 vindictive applications from its application store a year ago alone and has attempted to enhance its back-end to keep pernicious applications from getting into the store in any case.

Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our Google+ Pages.

Also Read:

 

Leave a Reply

Your email address will not be published. Required fields are marked *