Security News > 2020 > July > Joker billing fraud malware eluded Google Play security to infect Android devices
Always a thorn in Google's side, the Joker malware arrived as a new variant a few months ago and evaded Google Play Protect to infect legitimate apps and sign people up to premium services.
Check Point researchers disclosed its findings to Google, which removed 11 identified apps from Google Play by April 30, 2020.
During evaluation time, Joker does not even try to load the malicious payload, which makes it much easier to bypass Google Play Store protections.
"We found it hiding in the 'essential information' file every Android application is required to have. Our latest findings indicate that Google Play Store protections are not enough. We were able to detect numerous cases of Joker uploads on a weekly basis to Google Play, all of which were downloaded by unsuspecting users."
"The Joker malware is tricky to detect despite Google's investment in adding Play Store protections. Although Google removed the malicious apps from the Play Store, we can fully expect Joker to adapt again. Everyone should take the time to understand what Joker is and how it hurts everyday people."
News URL
Related news
- Singapore Police Extradites Malaysians Linked to Android Malware Fraud (source)
- Snowblind malware abuses Android security feature to bypass security (source)
- 'Konfety' Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins (source)
- Google patches exploited Android zero-day on Pixel devices (source)
- Google Warns of Pixel Firmware Security Flaw Exploited as Zero-Day (source)
- Pakistan-linked Malware Campaign Evolves to Target Windows, Android, and macOS (source)
- How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams (source)
- New Medusa malware variants target Android users in seven countries (source)
- Web scraping is not just a security or fraud problem (source)
- Forget security – Google's reCAPTCHA v2 is exploiting users for profit (source)