There are more problems on Android with these malicious apps, installed too many times

Deepak Gupta July 16, 2022
Updated 2022/07/16 at 8:07 AM

The Android universe has been repeatedly attacked with security issues. Malicious apps are multiplying and new attack vectors are constantly emerging that leave users vulnerable.

A new batch of apps with problems has reappeared on the Play Store, which again threaten users. There are only 8 apps, but they have already secured more than 3 million installations on Android smartphones.

<!–

PUB

–>

It starts to be too normal and simple to bring malware into Android. It arrives through apparently normal apps that users can find on the Play Store, where this type of problem shouldn't arise.

The latest is called Autolycos and was discovered by the security investigator Maxime Ingrao, which belongs to the company Evina. From what it revealed, this new malware acts silently and registers users in value-added services.

The discovery of these apps was immediately reported to Google, which removed them from the Play Store to protect users. Interestingly, the Android manager took several months to take concrete measures, which further heightened the spread of Autolycos.

  • Funny Camera (com.okcamera.funny) - 500,000 downloads
  • Razer Keyboard & Theme (com.razer.keyboards) - 50,000 downloads
  • Vlog Star Video Editor (com.vlog.star.video.editor) – 1 million downloads
  • Creative 3D Launcher (app.launcher.creative3d) – 1 million downloads
  • Wow Beauty Camera (com.wowbeauty.camera) – 100,000 downloads
  • Gif Emoji Keyboard (com.gif.emoji.keyboard) – 100,000 downloads
  • Freeglow Camera 1.0.0 (com.glow.camera.open) – 5,000 downloads
  • Coco Camera v1.1 (com.toomore.cool.camera) – 1,000 downloads

Of course, all those who have these apps present should proceed in the way that unfortunately has become increasingly normal. These must be uninstalled and users should be aware of abnormal behavior (battery, data, etc.) on the smartphone.

Android malware Google apps problem

The attackers' commitment seemed high, having even launched several Facebook advertising campaigns. These were intended to pass a degree of reliability to malicious apps, thus leading users to install these proposals with security problems.

Once again it is clear how simple it is to get malware to run widely on Android. A simple mechanism to subscribe to value-added services managed to spread and affect too many users of Google's system,

!function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod?
n.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq=n;
n.push=n;n.loaded=!0;n.version='2.0';n.queue=[];t=b.createElement(e);t.async=!0;
t.src=v;s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(window,
document,'script','https://connect.facebook.net/en_US/fbevents.js');
fbq('init', '1664527397186427'); // Insert your pixel ID here.
fbq('track', 'PageView');
(function(d, s, id) {
var js, fjs = d.getElementsByTagName(s)[0];
if (d.getElementById(id)) return;
js = d.createElement(s); js.id = id;
js.src = "//connect.facebook.net/pt_PT/sdk.js#xfbml=1&version=v2.3&appId=122308327859118";
fjs.parentNode.insertBefore(js, fjs);
}(document, 'script', 'facebook-jssdk'));

Share this Article
Leave a comment

Leave a Reply

Your email address will not be published.