Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Malware Versioning Targets Google Play Store

August 4, 2023
Reading Time: 2 mins read
in Alerts
Malware Versioning Targets Google Play Store

Threat actors have turned to a sophisticated technique known as versioning to evade malware detection measures on the Google Play Store and focus on targeting Android users, particularly their sensitive credentials, data, and financial information.

Google’s Cybersecurity Action Team (GCAT) has highlighted this concerning trend in their August 2023 Threat Horizons Report, underscoring the severity of campaigns employing versioning. Although not a new strategy, versioning employs a subtle and elusive approach, allowing developers to initially release an innocent app version that successfully passes Google’s pre-publication checks. Subsequently, these apps are updated with malicious components, often facilitated through dynamic code loading (DCL) from attacker-controlled servers, effectively transforming the app into a backdoor.

One notable instance of this technique was the “iRecorder – Screen Recorder” app, which remained benign for almost a year on the Play Store before being surreptitiously modified to spy on users.

Another example, SharkBot, a financial trojan, repeatedly posed as legitimate security and utility apps to gain unauthorized access to compromised devices and execute unauthorized money transfers. The use of dropper applications is also prevalent, where an app with limited functionality is installed, subsequently downloading a complete malware version to attract less attention.

In light of these emerging threats, it is crucial for Android users to exercise caution by relying on trusted app sources like Google Play and enabling Google Play Protect for notifications about potentially harmful apps.

Furthermore, the evolving nature of versioning and its ability to exploit Android vulnerabilities underlines the necessity of implementing robust defense-in-depth strategies, especially in enterprise settings. This approach includes restricting app installation to trusted sources and utilizing mobile device management (MDM) platforms to manage and secure corporate devices, ultimately safeguarding against the persistence and stealth of versioning-based attacks.

Reference:
  • How Malicious Android Apps Slip Into Disguise
Tags: AndroidAugust 2023CredentialsCyber AlertCyber Alerts 2023CyberattackCybersecurityGoogle Play StoreMalwareSensitive dataVulnerabilities
ADVERTISEMENT

Related Posts

Fileless Remcos RAT Delivery Via LNK Files

APT28 RoundPress Webmail Hack Steals Emails

May 16, 2025
Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

May 16, 2025
Fileless Remcos RAT Delivery Via LNK Files

Fileless Remcos RAT Delivery Via LNK Files

May 16, 2025
HTTPBot DDoS Threat To Windows Systems

Horabot Malware Targets LatAm Via Phishing

May 15, 2025
HTTPBot DDoS Threat To Windows Systems

Google Patches Chrome Account Takeover Bug

May 15, 2025
HTTPBot DDoS Threat To Windows Systems

HTTPBot DDoS Threat To Windows Systems

May 15, 2025

Latest Alerts

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial