Security News > 2020 > July > Joker Malware Apps Once Again Bypass Google's Security to Spread via Play Store
![Joker Malware Apps Once Again Bypass Google's Security to Spread via Play Store](/static/build/img/news/joker-malware-apps-once-again-bypass-google-s-security-to-spread-via-play-store.jpg)
In a report published by Check Point research today, the malware - infamously called Joker - has found another trick to bypass Google's Play Store protections: obfuscate the malicious DEX executable inside the application as Base64 encoded strings, which are then decoded and loaded on the compromised device.
"The Joker malware is tricky to detect, despite Google's investment in adding Play Store protections," said Check Point's Aviran Hazum, who identified the new modus operandi of Joker malware.
Campaigns involving Joker gained more foothold last year, with a number of malware-infected Android apps uncovered by CSIS Security Group, Trend Micro, Dr.Web, and Kaspersky, repeatedly finding unique ways to exploit gaps in Play Store security checks.
"As the Play Store has introduced new policies and Google Play Protect has scaled defenses, Bread apps were forced to continually iterate to search for gaps," Android's Security & Privacy Team said earlier this year.
As of January 2020, Google has removed more than 1,700 apps submitted to the Play Store over the past three years that had been infected with the malware.
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/XH6GIqWnLaE/joker-android-mobile-virus.html
Related news
- Snowblind malware abuses Android security feature to bypass security (source)
- Google Warns of Pixel Firmware Security Flaw Exploited as Zero-Day (source)
- How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams (source)
- New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration (source)
- Forget security – Google's reCAPTCHA v2 is exploiting users for profit (source)
- PKfail Secure Boot bypass lets attackers install UEFI malware (source)