Security News > 2023 > April > How much to infect Android phones via Google Play store? How about $20k

If you want to sneak malware onto people's Android devices via the official Google Play store, it may cost you about $20,000 to do so, Kaspersky suggests.
Before cybercriminals can share their malicious apps from Google's official store, they'll need a Play developer account, and Kaspersky says those sell for between $60 and $200 each.
Uploading straight-up spyware to the Play store for people to download and install may attract Google's attention, and cause the app and developer account to be thrown out.
The app may refuse to work as normal until the loader is allowed to do its thing, convincing marks into opening up their devices to crooks.
Google: If your Android app can create accounts, it better be easy to delete them, too Mozilla says 80 percent of Google Play's app safety labels are inaccurate Malware disguised as Tor browser steals $400k in cryptocash Check out this Android spyware, says Microsoft, the home of a gazillion Windows flaws.
To be clear, Google Play doesn't intentionally allow the sale of malicious apps on its store.
News URL
https://go.theregister.com/feed/www.theregister.com/2023/04/10/kaspersky_google_play_malicious_apps/
Related news
- New North Korean Android spyware slips onto Google Play (source)
- Malicious Android 'Vapor' apps on Google Play installed 60 million times (source)
- How Google tracks Android device users before they've even opened an app (source)
- Google fixes Android zero-day exploited by Serbian authorities (source)
- Google expands Android AI scam detection to more Pixel devices (source)
- Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud (source)
- Google Gemini's Astra (screen sharing) rolls out on Android for some users (source)
- Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices (source)
- Google fixes Android zero-days exploited in attacks, 60 other flaws (source)
- Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities (source)