Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Cyber Security

    Google Blocks 1.43 Million Malicious Apps, Bans 73,000 Bad Accounts in 2022

    justmattgBy justmattgMay 1, 2023No Comments4 Mins Read

    [ad_1]

    May 01, 2023Ravie LakshmananMobile Security / Android

    Google

    Google disclosed that its improved security features and app review processes helped it block 1.43 million bad apps from being published to the Play Store in 2022.

    In addition, the company said it banned 173,000 bad accounts and fended off over $2 billion in fraudulent and abusive transactions through developer-facing features like Voided Purchases API, Obfuscated Account ID, and Play Integrity API.

    The addition of identity verification methods such as phone number and email address to join Google Play contributed to a reduction in accounts used to publish apps that go against its policies, Google pointed out.

    The search behemoth further said it “prevented about 500K submitted apps from unnecessarily accessing sensitive permissions over the past 3 years.”

    “In 2022, the App Security Improvements program helped developers fix ~500K security weaknesses affecting ~300K apps with a combined install base of approximately 250B installs,” it noted.

    In contrast, Google blocked 1.2 million policy-violating apps from being published and banned 190,000 bad accounts in 2021.

    The development comes weeks after Google enacted a new data deletion policy that requires app developers to offer a “readily discoverable option” to users from both within an app and outside of it.

    Despite these efforts from Google, cybercriminals are continuing to find ways around the app storefront’s security protections and publish malicious and adware apps.

    Case in point, McAfee’s Mobile Research Team discovered 38 games masquerading as Minecraft and which have been installed by no less than 35 million users worldwide, primarily located in the U.S., Canada, South Korea, and Brazil.

    Android Security

    These gaming apps, while offering the promised functionality, have been found to incorporate the HiddenAds malware to stealthily load ads in the background to generate illicit revenue for its operators.

    Some of the most downloaded apps are as follows –

    • Block Box Master Diamond (com.good.robo.game.builder.craft.block)
    • Craft Sword Mini Fun (com.craft.world.fairy.fun.everyday.block)
    • Block Box Skyland Sword (com.skyland.pet.realm.block.rain.craft)
    • Craft Monster Crazy Sword (com.skyland.fun.block.game.monster.craft)
    • Block Pro Forrest Diamond (com.monster.craft.block.fun.robo.fairy)

    “One of the most accessible content for young people using mobile devices is games,” McAfee said. “Malware authors are also aware of this and try to hide their malicious features inside games.”

    Complicating the problem is the surge in Android banking malware that can be weaponized by threat actors to gain access to victim devices and harvest personal information.

    Another emerging trend is the use of binding services to trojanize legitimate applications and conceal a rogue APK payload. This technique has been adopted by bad actors to distribute an Android botnet dubbed DAAM, Cyble said.

    UPCOMING WEBINAR

    Learn to Stop Ransomware with Real-Time Protection

    Join our webinar and learn how to stop ransomware attacks in their tracks with real-time MFA and service account protection.

    Save My Seat!

    The malware, once installed, establishes connections with a remote server to perform a wide range of nefarious actions, including acting as ransomware by encrypting files stored in the devices using a password retrieved from the server.

    DAAM also abuses Android’s accessibility services to monitor users’ activity, thereby allowing it to log keystrokes, record VoIP calls from instant messaging apps, collect browser history, call logs, photos, screenshots, and SMS messages, run arbitrary code, and open phishing URLs.

    “Malware authors often leverage genuine applications to distribute malicious code to avoid suspicion,” the cybersecurity firm said in an analysis published last month.

    Android Security

    The findings also follow an advisory from CloudSEK, which discovered that several popular Android applications like Canva, LinkedIn, Strava, Telegram, and WhatsApp do not invalidate or revalidate session cookies after app data is transferred from one device to another.

    While this attack scenario requires an adversary to have physical access to a target’s phone, it could allow for account takeover and gain unauthorized access to confidential data.

    To mitigate such threats, it’s advised to enable two-factor authentication (2FA) to add an extra layer of account protection, scrutinize app permissions, secure devices with a password, and avoid leaving them unattended in public places.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



    [ad_2]

    Source link

    Previous ArticleZyxel Firewall Devices Vulnerable to Remote Code Execution Attacks — Patch Now
    Next Article New Decoy Dog Malware Toolkit Uncovered: Targeting Enterprise Networks
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑