Nine fake Android apps from the Play Store are downloaded 470,000 times masquerading as performance optimization tools. actually , that they had fraudulent access to users’ Google and Facebook accounts. this is often what's revealed by Trend Micro, a Japanese company specializing in cybersecurity.
The firm has indeed published a post to report malware targeting Android users from the Play Store. The strategy applied here is sort of pernicious. The malware actually hides in applications with names like “Speed Clean” or “Super Clean”. In other words, the thought is to pretend to be a tool capable of optimizing the performance of your smartphone by cleaning it from certain superfluous files.
9 infected Android apps are:
|App Name||Package||No. of Installs|
|Shoot Clean-Junk Cleaner,Phone Booster,CPU Cooler||com.boost.cpu.shootcleaner||10,000+|
|Super Clean Lite- Booster, Clean&CPU Cooler||com.boost.superclean.cpucool.lite||50,000+|
|Super Clean-Phone Booster,Junk Cleaner&CPU Cooler||com.booster.supercleaner||100,000+|
|Quick Games-H5 Game Center||com.h5games.center.quickgames||100,000+|
|Rocket Cleaner Lite||com.party.rocketcleaner.lite||10,000+|
|Speed Clean-Phone Booster,Junk Cleaner&App Manager||com.party.speedclean||100,000+|
Instead of completing this task, the applications concerned will instead attend download up to 3000 variants of malware on infected smartphones and, because of this, they're going to be ready to access the Google and Facebook accounts of the victims to conduct fraudulent advertising practices. The false cleaning tools will, among other things, display advertisements from legitimate platforms like Google AdMob or Facebook Audience Network then simulate clicks on the advertisements.
Finally, they will also use accessibility options to post fake comments and ratings to the Play Store to draw in others to download them.
Fake apps also prompt users to offer them permissions while disabling Play Protect, the safety program within the Google Play Store. this enables them to download more and more fraudulent software without being spotted.
The affected apps are faraway from the Play Store by Google, but it's expected that the malware will resume the attack with other fake apps. the foremost affected countries are Japan, Taiwan, the us , Thailand, Pakistan and India.