DV Hardware - bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, hardware and technology!
   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
 
DarkVision Hardware - Daily tech news
July 9, 2020 
Main Menu
Home
Info
News archives
Articles
Howto
Reviews
 

Who's Online
There are currently 79 people online.

 

Latest Reviews
Ewin Racing Flash gaming chair
Arctic BioniX F120 and F140 fans
Jaybird Freedom 2 wireless sport headphones
Ewin Racing Champion gaming chair
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset
 

Follow us
RSS
 

Google Play hosted malicious apps that got installed by 1.7 million users

Posted on Wednesday, March 25 2020 @ 11:13:24 CET by


GOOG logo
ARS Technica writes Check Point security researchers discovered that Google's Play store hosted a total of 56 malicious apps that got installed by 1.7 million users. Twenty-four of these apps were marketed to children. The security researchers note these apps were written in native Android code (C or C++), which made them harder to detect than typical Android apps that are written in Java.
Tekya is a family of malware that generates fraudulent clicks on ads and banners delivered by agencies including Google’s AdMob, AppLovin’, Facebook, and Unity. To give the clicks the air of authenticity, the well-obfuscated code causes infected devices to use Android’s “MotionEvent” mechanism to imitate legitimate user actions. At the time that researchers from security firm Check Point discovered them, the apps went undetected by VirusTotal and Google Play Protect. Twenty-four of the apps that contained Tekya were marketed to children. Google removed all 56 of the apps after Check Point reported them.
Additionally, security researchers from Dr.Web discovered an undisclosed number of Google Play apps with Android.Circle.1 malware. These apps were downloaded over 700,000 times. All reported apps have been removed by Google. If things work as intended, this process also involves the installation of malicious apps on user devices.



 



 

DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2019 DM Media Group bvba