Over 60,000 android apps secretly installed adware for months, report claims

A recent investigation by Romanian cybersecurity firm Bitdefender has revealed that over 60,000 Android apps posing as legitimate applications, have been silently installing adware on mobile devices for the past six months without user knowledge.

Bitdefender's mobile security software, equipped with an anomaly detection feature, successfully identified the malicious apps last month. The cybersecurity firm has already discovered 60,000 unique samples of adware-infected apps and suspects that many more are circulating undetected.

The campaign is believed to have originated in October 2022 and employs various disguises, such as fake security software, game cracks, cheats, VPN software, Netflix and utility apps. These malicious apps are not hosted on Google Play but are instead distributed via third-party websites found in Google Search results, where users can download APKs (Android packages) to manually install apps.

Visiting these sites will lead to redirects to ad-filled websites or prompts to download the desired app. The download sites are purposefully designed to distribute adware-infected Android apps. Once installed, the apps do not configure themselves to run automatically but instead rely on the standard Android app installation flow, where users are prompted to manually open the app.

Detecting these malicious apps is challenging due to their lack of an icon and the presence of a UTF-8 character in the app's label. This hidden nature allows the app to remain dormant unless the user initiates it, resulting in potential invisibility.

Once launched, the app displays an error message claiming that the "application is unavailable in your region" and prompts the user to uninstall it. However, in reality, the app remains installed and becomes active after a two-hour delay or when specific triggers, such as device booting or unlocking, occur. The app then contacts the attackers' servers to fetch advertisement URLs, which are displayed in the mobile browser or as full-screen WebView ads.

Currently, the adware campaign is primarily focused on displaying advertisements, but researchers warn that threat actors could easily replace the adware URLs with more malicious websites, such as those hosting banking Trojans or ransomware.

Android devices are particularly vulnerable to malware due to the ability to install applications from outside the official Google Play Store, where apps undergo thorough inspection for malware. However, threat actors continue to evade detection, even on Google Play, leading to the broad distribution of malicious apps.

Recently, cybersecurity researchers from Dr. Web and CloudSEK discovered a spyware software development kit (SDK) installed on over 400 million Android devices from apps available on Google Play.

More from Business

Coming Up on Dubai Eye

  • Afternoons with Helen Farmer

    1:00pm - 4:00pm

    Every weekday afternoon, Helen Farmer will help you to navigate the highs and lows of life in the UAE. Stay up to date with what’s happening and where to go.

  • The Debrief

    4:00pm - 7:00pm

    Join Dane & Lucy on Dubai Eye 103.8 for The Debrief from 4pm to 7pm, the perfect way to unwind after a busy day at the office.

BUSINESS BREAKFAST LATEST

On Dubai Eye

  • Is There Sufficient House Supply In UAE

    Dubai’s current population is more than double compared to almost twenty years ago, which now stands at 3.7 million. Lots of families are also moving to the UAE now. So what does it mean for the property market?

  • Noon's First Female Delivery Driver

    Glory Ehirim Nkiruka is Noon’s first ever female delivery driver. In her first ever interview, she explained why she loves her job, despite the heat!