Security News > 2022 > July > Malicious Android apps with 300K installs found on Google Play

Cybersecurity researchers have discovered three Android malware families infiltrating the Google Play Store, hiding their malicious payloads inside many seemingly innocuous applications.
The malicious activities suffered by users who installed the malware apps included stolen data, social media account takeovers, SMS interception, and unauthorized charges to their mobile numbers.
The analysts informed Google of their findings, and all apps have since been removed from the Play Store.
Almost half of them are communication apps because these naturally require users to grant access to risky permissions, so it's easier for the malware to acquire the high-level privileges needed for its malicious operation.
"Many Joker apps hide the payload in the assets folder of the Android Package Kit and creates an ARM ABI executable to avoid detection by most sandboxes which are based on x86 architecture," explains Zscaler in the report.
To keep the chances of installing a malicious app from the Google Play Store, only install the absolutely essential applications, read reviews before installing an app to see if anyone found malicious behavior, and trust only large well-known publishers.
News URL
Related news
- Google fixes Android zero-days exploited in attacks, 60 other flaws (source)
- Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities (source)
- Google adds Android auto-reboot to block forensic data extractions (source)
- Update ASAP: Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers (source)
- Google fixes actively exploited FreeType flaw on Android (source)
- Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android (source)
- Google’s Advanced Protection Now on Android (source)
- Google strengthens secure enterprise access from BYOD Android devices (source)