{"id":16636,"date":"2019-09-11T09:39:27","date_gmt":"2019-09-11T13:39:27","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/google-play-malware\/16636\/"},"modified":"2020-04-02T16:07:50","modified_gmt":"2020-04-02T10:37:50","slug":"google-play-malware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/google-play-malware\/16636\/","title":{"rendered":"All apps on Google Play are safe: Fact or fiction?"},"content":{"rendered":"<p>We always recommend downloading Android apps from official stores and nowhere else. But that doesn\u2019t mean there are no viruses in the Google Play. It is true, however, that you\u2019ll find fewer of them in the official store than on third-party sites, and they get removed on a regular basis.<\/p>\n<h2>How Google monitors the security of Android apps<\/h2>\n<p>It is no mean feat for malware to get into Google Play. Before they publish an app, moderators check it for compliance with an <a href=\"https:\/\/play.google.com\/about\/developer-content-policy\/?hl=EN\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">extensive list of requirements<\/a>. If they find a violation, they ban the program from the store.<\/p>\n<p>However, Google Play receives such a vast number of new apps and updates of existing ones that it is simply not possible for the moderators to keep track of everything. So from time to time, malicious apps do slip in. Here are some of the most striking incidents.<\/p>\n<h3>Ad you don\u2019t want to see<\/h3>\n<p>Recently, our researchers <a href=\"https:\/\/www.kaspersky.com\/blog\/camscanner-malicious-android-app\/28156\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">detected malicious code in the CamScanner<\/a> app for digitizing documents. Not only was the app available on Google Play, but according to the store it was installed by more than 100 million users.<\/p>\n<p>What went wrong? Well, up until a certain point, CamScanner was a normal app that simply carried out its stated functions. Its developers derived income from advertising and paid features\u00a0\u2014 nothing unusual so far. But that changed when a malicious advertising module was added to the app.<\/p>\n<p>Malware in the shape of the Necro.n <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/trojan-droppers\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">Trojan dropper<\/a> snuck into one of the advertising modules and installed another Trojan tasked with downloading other muck onto the device\u00a0\u2014 for example, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/adware\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">advertising apps<\/a> and programs taking out paid subscriptions to third-party services behind the user\u2019s back.<\/p>\n<p>Our experts reported the find to Google, whose administrators removed the app from the store. CamScanner\u2019s developers also promptly removed the malicious modules from the app to get it back into the store. However, the infected version had been available for download for quite some time.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-2\">\n<h3>Thieving player<\/h3>\n<p>CamScanner is by no means the only example of an app that saw malicious features appearing after it was already available in the Google Play store. The creators of a Trojan disguised as a player for listening to music in VKontakte (VK) managed to bypass the store\u2019s moderators in the same manner for several years.<\/p>\n<p>A clean version was initially uploaded to Google Play, followed by a couple of harmless updates. But a few updates in, the app began stealing logins and passwords from VK accounts. Moreover, the victims most likely knew nothing about it, and their accounts were surreptitiously used to promote VK groups.<\/p>\n<p>When the updated version of the player was unmasked and deleted from the store, its creators immediately uploaded a new one (actually, several). In 2015, no fewer than seven different builds of the malicious program were <a href=\"https:\/\/securelist.com\/stealing-to-the-sound-of-music\/72458\/\" target=\"_blank\" rel=\"noopener noreferrer\">removed from Google Play<\/a>. And a few more in 2016. Over a two-month period in 2017, our analysts counted <a href=\"https:\/\/securelist.com\/still-stealing\/83343\/\" target=\"_blank\" rel=\"noopener noreferrer\">85 such apps<\/a> on Google Play, one of which had been downloaded more than a million times. In addition, fake versions of Telegram by the same authors appeared in the store\u00a0\u2014 these apps did not steal passwords, but they added the victim to groups and chats of interest to the cybercriminals.<\/p>\n<h3>Malicious army on Google Play<\/h3>\n<p>Alas, 85 copies of one malicious app is not where the story ends. In 2016, experts found no less than <a href=\"https:\/\/www.kaspersky.com\/blog\/dresscode-android-trojan\/13219\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">400 games and other programs<\/a> on Google Play furnished with the DressCode Trojan.<\/p>\n<p>Once on a victim\u2019s device, the malware establishes a connection with the command-and-control server and then \u201cfalls asleep.\u201d Later, cybercriminals can use such infected sleeper gadgets for DDoS attacks, to inflate ad-banner clicks, or to infiltrate the local networks to which the gadgets are connected, such as a home network or a company\u2019s infrastructure.<\/p>\n<p>In fairness, Google Play moderators cannot really be blamed for the oversight; DressCode is quite difficult to spot\u00a0\u2014 its code is so small that it gets lost in that of the media app. Besides, significantly more infected programs were detected on third-party sites than on Google Play\u00a0\u2014 in total, the researchers found approximately 3,000 games, skins, and smartphone cleaning apps containing the DressCode Trojan. Yet 400 is still an awful lot.<\/p>\n<h2>How not to pick up malware on Google Play<\/h2>\n<p>As you can see, the mere fact that an app made it into the official Android store does not mean that it is safe\u00a0\u2014 sometimes malware does get in. To avoid an infection, be wary of all programs, including those on Google Play, and observe several rules of digital hygiene.<\/p>\n<ul>\n<li>Do not download apps to your smartphone straight away. Read user reviews of the app\u00a0\u2014 they can contain valuable information about its behavior. Look for information about the developer; perhaps its past creations were removed from the store, or it is linked to some dubious stories.<\/li>\n<li>Read user reviews with caution. Keep in mind that some shady developers may flood their pages with <a href=\"https:\/\/www.kaspersky.com\/blog\/dont-believe-google-play-ratings\/12882\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">positive reviews<\/a>, so look for reviews of a decent length (not simply \u201cGreat app!\u201d after \u201cGreat app!\u201d) that use natural-seeming language and have a legitimate feel.<\/li>\n<li>Make it a rule to rid your Android smartphone or tablet of unnecessary programs once every few months. The fewer apps on the device, the easier it is to monitor and control them.<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.co.in\/mobile-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____ccbe3384bb4e1385\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a><b> <\/b>\u2014 this will protect you from threats the Google Play moderators miss.<\/li>\n<\/ul>\n<p><strong>So, is it fact or fiction that there are no malicious apps on Google Play?<\/strong><\/p>\n<p><strong>Fiction. Malware does occasionally infiltrate Google Play. The risk of picking up an infection in the official Android store is much lower than on third-party sites, but it still exists.<\/strong><\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s no malware in the official Android store, right? We get to the bottom of this claim.<\/p>\n","protected":false},"author":2484,"featured_media":16637,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2196],"tags":[105,1222,183,97,45,527,1898],"class_list":{"0":"post-16636","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-fact-or-fiction","10":"tag-google-play","11":"tag-security-2","12":"tag-smartphones","13":"tag-threats","14":"tag-tips"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/google-play-malware\/16636\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/google-play-malware\/14028\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/google-play-malware\/6503\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/google-play-malware\/18602\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/google-play-malware\/16674\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/google-play-malware\/15428\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/google-play-malware\/19299\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/google-play-malware\/17997\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/google-play-malware\/23629\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/google-play-malware\/6434\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/google-play-malware\/28604\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/google-play-malware\/12310\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/google-play-malware\/12318\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/google-play-malware\/11181\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/google-play-malware\/20199\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/google-play-malware\/24133\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/google-play-malware\/24283\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/google-play-malware\/19072\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/google-play-malware\/23358\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/google-play-malware\/23268\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/16636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=16636"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/16636\/revisions"}],"predecessor-version":[{"id":20208,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/16636\/revisions\/20208"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/16637"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=16636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=16636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=16636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}