Google explains how Android malware slips onto Google Play Store

Teilen:

The Google Cloud security team acknowledged a common tactic known as versioning used by malicious actors to slip malware on Android devices after evading the Google Play Store’s review process and security controls.

The technique works either by introducing the malicious payloads through updates delivered to already installed applications or by loading the malicious code from servers under the threat actors’ control in what is known as dynamic code loading (DCL).

It allows the threat actors to deploy their payloads as native, Dalvik, or JavaScript code on Android devices by circumventing the app store’s static analysis checks.

“One way malicious actors attempt to circumvent Google Play’s security controls is through versioning,” the company says in this year’s threat trends report.

“Versioning occurs when a developer releases an initial version of an app on the Google Play Store that appears legitimate and passes our checks, but later receives an update from a third-party server changing the code on the end user device that enables malicious activity.”

While Google says all applications and patches submitted for inclusion into the Play Store go through rigorous PHA (Potentially Harmful Application) screening, “some of those controls” are bypassed through DCL.

Play Store security controls bypass through versioning (DCL)
Play Store security controls bypass through versioning (Google)

Google explained that applications found engaging in such activities breach the Google Play Deceptive Behavior policy and could be labeled as backdoors.

Per the company’s Play Policy Center guidelines, apps distributed through Google Play are explicitly barred from altering, substituting, or updating themselves through any means other than the official update mechanism provided by Google Play.

Additionally, apps are strictly prohibited from downloading executable code (such as dex, JAR, or .so files0 from external sources to the official Android App Store.

Google also highlighted a specific malware variant named SharkBot, first spotted by Cleafy’s Threat Intelligence Team in October 2021 and known for utilizing this technique in the wild.

SharkBot is banking malware that will make unauthorized money transfers via the Automated Transfer Service (ATS) protocol after compromising an Android device.

To evade detection by Play Store systems, the threat actors responsible for SharkBot have adopted the now common strategy of releasing versions with limited functionality on Google Play, concealing their apps’ suspicious nature.

However, once a user downloads the trojanized app, it downloads the full version of the malware.

Sharkbot has been camouflaged as Android antivirus software und various system utilities and has successfully infected thousands of users via apps that passed the Google Play Store’s submission checks for malicious behavior.

Cybersecurity reporter Brian Krebs also highlighted the use of a different mobile malware obfuscation technique for the same purpose, recently unveiled by ThreatFabric security researchers.

This method effectively breaks Google’s app analysis tools, preventing them from scanning malicious APKs (Android application packages). As a result, these harmful APKs can successfully install on users’ devices, despite being labeled as invalid.

 

(c) Lawrence Abrams

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
6:57 am, Mai 24, 2025
Wetter-Symbol 13°C
L: 13° | H: 14°
moderate rain
Luftfeuchtigkeit: 90 %
Druck: 1013 mb
Wind: 10 mph SW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0.39 mm
Wolken: 75%
Regen Chance: 0%
Sichtbarkeit: 5 km
Sonnenaufgang: 4:56 am
Sonnenuntergang: 8:58 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
13° | 14°°C 1 mm 100% 13 mph 92 % 1013 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
13° | 20°°C 0.93 mm 93% 16 mph 90 % 1015 mb 0 mm/h
Mo. Mai 26 10:00 pm
Wetter-Symbol
10° | 17°°C 1 mm 100% 13 mph 79 % 1018 mb 0 mm/h
Di. Mai 27 10:00 pm
Wetter-Symbol
13° | 20°°C 1 mm 100% 14 mph 91 % 1017 mb 0 mm/h
Mi. Mai 28 10:00 pm
Wetter-Symbol
14° | 21°°C 1 mm 100% 16 mph 97 % 1018 mb 0 mm/h
Today 7:00 am
Wetter-Symbol
13° | 13°°C 1 mm 100% 10 mph 90 % 1013 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
14° | 16°°C 0.24 mm 24% 10 mph 92 % 1013 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
19° | 22°°C 0 mm 0% 13 mph 70 % 1012 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
24° | 24°°C 0 mm 0% 13 mph 54 % 1011 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
19° | 19°°C 0.43 mm 43% 9 mph 77 % 1011 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
16° | 16°°C 0 mm 0% 11 mph 88 % 1010 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
15° | 15°°C 0 mm 0% 12 mph 85 % 1009 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
15° | 15°°C 0.93 mm 93% 15 mph 90 % 1007 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€95,255.86
-2.24%
Ethereum(ETH)
€2,242.40
-5.30%
Fesseln(USDT)
€0.88
0.02%
XRP(XRP)
€2.06
-4.53%
Solana(SOL)
€154.01
-3.84%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.200719
-7.53%
Shiba Inu(SHIB)
€0.000012
-7.05%
Pepe(PEPE)
€0.000012
-10.71%
Peanut das Eichhörnchen(PNUT)
€0.306300
-7.81%
Nach oben scrollen