Security News > 2022 > October > Android malware droppers with 130K installs found on Google Play
A set of Android malware droppers were found infiltrating the Google Play store to install banking trojans pretending to be app updates.
Malware droppers are a challenging category of apps to stop because they do not contain malicious code themselves and thus can more easily pass Google Play reviews when submitted to the store.
Researchers at Threat Fabric, who discovered the new set of droppers, report a rise in the use of droppers for Android malware distribution precisely because they can offer a stealthy pathway to infecting devices.
Like the SharkBot droppers, these droppers also display a request to install a fake update, this time disguised as a Google Play notice.
The use of droppers has become a reliable method for malware installs to bypass scanners and fraud detection mechanisms; hence their deployment rate is expected to grow further.
"Distribution through droppers on Google Play still remains the most"affordable" and scalable way of reaching victims for most of the actors of different level," warns Threat Fabric.
News URL
Related news
- Free VPN apps on Google Play turned Android phones into proxies (source)
- Watch Out for Spoofed Zoom, Skype, Google Meet Sites Delivering Malware (source)
- PixPirate Android malware uses new tactic to hide on phones (source)
- Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites (source)
- Google's new AI search results promotes sites pushing malware, scams (source)
- Apps secretly turning devices into proxy network nodes removed from Google Play (source)
- Vultur banking malware for Android poses as McAfee Security app (source)
- Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies (source)
- Google rolls out new Find My Device network to Android devices (source)
- SoumniBot malware exploits Android bugs to evade detection (source)