Malicious Apps Evade Google Play Store Scanners with Sneaky Versioning Technique

SIDDARDA GOWTHAM JAGABATHINA
3 min readAug 4, 2023

--

Hey, Mck’s Today we are going to talk about a hacking activity that successfully bypassed google play store scanners using the versioning technique Now, let's delve into the specifics of this activity. In a concerning development, threat actors have been employing a clever technique called versioning to bypass Google Play Store’s malware detection mechanisms. This tactic allows them to target Android users and compromise their credentials, data, and finances. Despite not being a new method, versioning remains hard to detect, making it a preferred choice for malicious developers.

The versioning technique involves releasing an innocent-looking initial version of an app on the Play Store that successfully passes Google’s pre-publication security checks. However, later updates to the app introduce malicious components. This is done by pushing updates from servers controlled by the attackers, which utilize dynamic code loading (DCL) to deliver the harmful code to end-user devices. Essentially, this turns the app into a dangerous backdoor, allowing the attackers to exploit the compromised devices.

A notable case was reported by ESET in May, involving an app named “iRecorder — Screen Recorder.” The app remained undetected for nearly a year before it started spying on users after receiving malicious updates. Another malicious app, known as SharkBot, has repeatedly surfaced on the Play Store disguised as security and utility apps. This financial trojan initiates unauthorized money transfers from infected devices, using the Automated Transfer Service (ATS) protocol.

Dropper applications are another type of malicious software that tries to avoid detection. They appear on the Play Store with reduced functionality, but once installed, they download the full version of the malware. This approach aims to attract less attention during the initial screening process. To combat these threats, Google Cybersecurity Action Team (GCAT) recommends adhering to defense-in-depth principles, such as limiting app installations to trusted sources like Google Play or managing corporate devices through a mobile device management (MDM) platform. Additionally, it’s crucial for Android users to download apps from trusted sources and enable Google Play Protect. This feature notifies users if a potentially harmful app (PHA) is found on their device.

The use of versioning by malicious actors to circumvent Google Play Store’s security measures is a serious concern for Android users. As attackers continuously refine their tactics, users must remain vigilant and follow recommended security practices to protect their devices and data from potential threats. By staying informed and cautious, users can significantly reduce their risk of falling victim to these sneaky attacks.

#AndroidSecurity #GooglePlayStore #MaliciousApps #MalwareDetection #VersioningTechnique #CyberThreats #MobileSecurity #DynamicCodeLoading #BackdoorAttacks #GooglePlayProtect #DataPrivacy #Cybersecurity #ThreatMitigation #StaySafeOnline #ProtectYourDevices #AppSecurity #GoogleCybersecurityActionTeam #SecurityTips #TechNews#McKsTechNews #HackingActivity #GooglePlayStore #VersioningTechnique #MalwareDetection #Cybersecurity #TechTalk #MobileSecurity #AndroidThreats #DynamicCodeLoading #BackdoorAttacks #CyberCrime #StayInformed #StayProtected #TechUpdates #OnlineSafety #MaliciousApps #DataPrivacy #CyberThreats #InfoSec

--

--

SIDDARDA GOWTHAM JAGABATHINA
SIDDARDA GOWTHAM JAGABATHINA

Written by SIDDARDA GOWTHAM JAGABATHINA

Passionate about cybersecurity and eager to share the knowledge I have gained and continue to acquire to educate the world.

No responses yet