Miscellaneous 4 min. read

Avoid these Five Malware Strains on Google Play

Avoid these Five Malware Strains on Google Play

Stay safe online using the best malware protection VPN

The Google Play Store is the primary source of apps for Android users, which is why Alphabet, its parent company, is doing everything it can to keep it free from malware. But even with the sophisticated and multi-layered scanning and verification process employed by Google Play, a few malware strains still manage to get into the store, putting a lot of Android users at risk.

Hotspot Shield Elite, the best malware protection VPN

Installing a virtual private network (VPN) such as Hotspot Shield on your device is an effective way of protecting yourself from malware attacks online. Using a database of more than 3.5 million known malware-infected sites, Hotspot Shield malware protection VPN keeps you secure by letting you know if a site is malware-infected, and then blocks that site.

Get Hotspot Shield and upgrade to Elite now!

By upgrading to the Elite version, you’ll get to enjoy additional benefits that make your online experience better. The Elite version not only provides ad-free use, it also lets you access not one, but more than 20 virtual locations all over the world, allowing you to enjoy your favorite content and websites like never before.

Protect yourself from malware on Google Play by getting Hotspot Shield Elite for your device now! For more information about the benefits of this malware protection VPN, visit the Hotspot Shield website now.

Here are five malware strains that are currently plaguing the Play Store:

DressCode

Just like the Viking Horde malware, DressCode tricks potential victims into downloading it by posing as legitimate Play Store apps, themes and skins. Over 400 Google Play apps are currently known to be infected with the DressCode malware. One of them, a Grand Theft Auto mod for Minecraft, has been downloaded at least 100,000 times.

Once infected, hackers are then able to access sensitive data and files in that device, use that device to spy on the owner, and force that device into accommodating payloads without the knowledge of the user. DressCode will also recruit that device into a botnet, which opens more doors for other malware attacks and distributed denial-of-service attacks.

Porn Clicker

In February this year, more than 340 Google Play Store apps were found to be carrying a malware strain that opens a hidden browser to generate clicks on pornographic ads. Aptly named the Porn Clicker, the malware can avoid detection by antivirus and anti-malware programs, including those from Avast, Kaspersky, and Symantec, by remaining dormant upon detecting any of these security software.

Godless

We mentioned the Godless malware in a previous blog post as one of the malware strains you should be aware of. Godless continues to exist in many apps on the Google Play Store, and can affect Android devices running Lollipop or earlier.

What makes Godless a fearsome malware strain is that it makes use of a number of possible exploits in the infected device to get root privilege. Once a device has been infected, the malware secretly accommodates payloads until the device is turned off, after which it roots the device, erasing all of the user’s files and data.

Android.Spy.277

Android.Spy.277 operates just like any other malware out there; it collects the device’s sensitive information such as its IMEI code, social media and bank account information, and even the location of the owner of the device. It then stealthily installs additional malicious software such as adware and rogue security software.

The malware strain was found by Russian security researchers in more than 100 fake instant messaging, gaming, photo editing and other apps on Google Play, and has been downloaded more than 3 million times.

Overseer

Discovered by San Francisco-based mobile security company Lookout in September in four apps on the Google Play Store, the Overseer malware is known to target foreigners looking for embassy information. Once a victim’s device gets infected, the malicious software then collects sensitive files and information from the device such as contacts, data, root ID, location data and passwords, which it sends to the command and control (C&C) servers for use by hackers later on.

Because it uses C&C servers on Facebook’s Parse server, which is hosted on Amazon Web Services, the Overseer malware is able to keep its network traffic from being detected by traditional intrusion detection systems. Apps riddled with the Overseer malware have been downloaded more than 10,000 times as of September.

Hotspot Shield Elite, the best malware protection VPN

Installing a virtual private network (VPN) such as Hotspot Shield on your device is an effective way of protecting yourself from malware attacks online. Using a database of more than 3.5 million known malware-infected sites, Hotspot Shield malware protection VPN keeps you secure by letting you know if a site is malware-infected, and then blocks that site.

Get Hotspot Shield and upgrade to Elite now!

By upgrading to the Elite version, you’ll get to enjoy additional benefits that make your online experience better. The Elite version not only provides ad-free use, it also lets you access not one, but more than 20 virtual locations all over the world, allowing you to enjoy your favorite content and websites like never before.

Protect yourself from malware on Google Play by getting Hotspot Shield Elite for your device now! For more information about the benefits of this malware protection VPN, visit the Hotspot Shield website now.

Get the latest stories and tips from Hotspot Shield in your inbox