Cybercriminals offering services to add malicious apps to Google Play

Share post:

A new report by Kaspersky reveals that malware developers have created a thriving market for adding malicious Android apps to Google Play. The services, which cost anywhere between $2,000 to $20,000 depending on the type of malicious behavior requested by cybercriminals, are offered via Telegram, dark web marketplaces, and hacking forums that allow threat actors to promote their services.

Malware developers promise to hide malware in legitimate-looking apps that impersonate antivirus programs, cryptocurrency asset managers, QR-code scanners, small games, and dating apps. The malicious but innocuous-looking apps are published on Google Play but include the ability to fetch malicious code via a later update.

Kaspersky reports that apart from Google Play loaders, which sell for an average of roughly $7,000, cybercriminals also sell services like malware obfuscation for $8 to $30 or “clean” Google developer accounts that cost $60. These services guarantee that the app will remain on Google Play for at least one week, with some developers promising at least 5,000 installs.

Upon installation, the malware loader apps request the user to grant risky permissions like access to the phone’s camera, microphone, or Accessibility Services, and prevent access to the app’s main functions until the requests are approved.

To promote these loaders, the sellers publish videos showcasing their features, user-friendly interface, granular targeting filters, and more. “Cybercriminals may also supplement the trojanized app with functionality for detecting a debugger or sandbox environment,” explains Kaspersky.

To defend against these stealthy attacks, Android users should carefully review the requested permissions upon app installation, check user comments on Google Play, and keep the number of installed apps at a minimum. Even more important, users should never install Android APKs from third-party sites, as they are a common distribution method for malware.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Hackers Plant False Memories in ChatGPT to Steal User Data

A security researcher has uncovered a vulnerability in ChatGPT that could allow hackers to store false information and...

“Octo2” Trojan Targets Bank Accounts by Posing as VPN or Chrome Apps on Android

A new malware variant called “Octo2” is spreading across Android devices by posing as popular apps like NordVPN...

Evilginx – Open source tool can bypass Multi-Factor Authentication (MFA)

Security vendor Abnormal Security is reporting a new cybersecurity tool that is gaining traction among cybercriminals. The tool,...

Kaspersky’s exit from US market frightens some customers

Kaspersky, the Russian cybersecurity firm, has unexpectedly removed its antivirus software from U.S. customers' computers, replacing it with...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways