Security News > 2020 > July > Joker billing fraud malware eluded Google Play security to infect Android devices
Always a thorn in Google's side, the Joker malware arrived as a new variant a few months ago and evaded Google Play Protect to infect legitimate apps and sign people up to premium services.
Check Point researchers disclosed its findings to Google, which removed 11 identified apps from Google Play by April 30, 2020.
During evaluation time, Joker does not even try to load the malicious payload, which makes it much easier to bypass Google Play Store protections.
"We found it hiding in the 'essential information' file every Android application is required to have. Our latest findings indicate that Google Play Store protections are not enough. We were able to detect numerous cases of Joker uploads on a weekly basis to Google Play, all of which were downloaded by unsuspecting users."
"The Joker malware is tricky to detect despite Google's investment in adding Play Store protections. Although Google removed the malicious apps from the Play Store, we can fully expect Joker to adapt again. Everyone should take the time to understand what Joker is and how it hurts everyday people."
News URL
Related news
- Google Blocks Unsafe Android App Sideloading in India for Improved Fraud Protection (source)
- Fake Trading Apps Target Victims Globally via Apple App Store and Google Play (source)
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- ‘Pig butchering’ trading apps found on Google Play, App Store (source)
- Google brings better bricking to Androids, to curtail crims (source)
- TrickMo malware steals Android PINs using fake lock screen (source)
- Over 200 malicious apps on Google Play downloaded millions of times (source)
- Android 15 unveils new security features to protect sensitive data (source)
- Fake Google Meet conference errors push infostealing malware (source)
- How to enable Safe Browsing in Google Chrome on Android (source)