Google explains how Android malware slips onto Google Play Store

Share:

The Google Cloud security team acknowledged a common tactic known as versioning used by malicious actors to slip malware on Android devices after evading the Google Play Store’s review process and security controls.

The technique works either by introducing the malicious payloads through updates delivered to already installed applications or by loading the malicious code from servers under the threat actors’ control in what is known as dynamic code loading (DCL).

It allows the threat actors to deploy their payloads as native, Dalvik, or JavaScript code on Android devices by circumventing the app store’s static analysis checks.

“One way malicious actors attempt to circumvent Google Play’s security controls is through versioning,” the company says in this year’s threat trends report.

“Versioning occurs when a developer releases an initial version of an app on the Google Play Store that appears legitimate and passes our checks, but later receives an update from a third-party server changing the code on the end user device that enables malicious activity.”

While Google says all applications and patches submitted for inclusion into the Play Store go through rigorous PHA (Potentially Harmful Application) screening, “some of those controls” are bypassed through DCL.

Play Store security controls bypass through versioning (DCL)
Play Store security controls bypass through versioning (Google)

Google explained that applications found engaging in such activities breach the Google Play Deceptive Behavior policy and could be labeled as backdoors.

Per the company’s Play Policy Center guidelines, apps distributed through Google Play are explicitly barred from altering, substituting, or updating themselves through any means other than the official update mechanism provided by Google Play.

Additionally, apps are strictly prohibited from downloading executable code (such as dex, JAR, or .so files0 from external sources to the official Android App Store.

Google also highlighted a specific malware variant named SharkBot, first spotted by Cleafy’s Threat Intelligence Team in October 2021 and known for utilizing this technique in the wild.

SharkBot is banking malware that will make unauthorized money transfers via the Automated Transfer Service (ATS) protocol after compromising an Android device.

To evade detection by Play Store systems, the threat actors responsible for SharkBot have adopted the now common strategy of releasing versions with limited functionality on Google Play, concealing their apps’ suspicious nature.

However, once a user downloads the trojanized app, it downloads the full version of the malware.

Sharkbot has been camouflaged as Android antivirus software and various system utilities and has successfully infected thousands of users via apps that passed the Google Play Store’s submission checks for malicious behavior.

Cybersecurity reporter Brian Krebs also highlighted the use of a different mobile malware obfuscation technique for the same purpose, recently unveiled by ThreatFabric security researchers.

This method effectively breaks Google’s app analysis tools, preventing them from scanning malicious APKs (Android application packages). As a result, these harmful APKs can successfully install on users’ devices, despite being labeled as invalid.

 

(c) Lawrence Abrams

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:31 am, May 18, 2025
weather icon 12°C
L: 11° | H: 14°
scattered clouds
Humidity: 68 %
Pressure: 1020 mb
Wind: 3 mph E
Wind Gust: 10 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 29%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 5:04 am
Sunset: 8:49 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
11° | 14°°C 0 mm 0% 8 mph 64 % 1020 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
9° | 19°°C 0.2 mm 20% 12 mph 80 % 1022 mb 0 mm/h
Tue May 20 10:00 pm
weather icon
9° | 21°°C 0 mm 0% 8 mph 71 % 1023 mb 0 mm/h
Wed May 21 10:00 pm
weather icon
12° | 18°°C 1 mm 100% 7 mph 89 % 1020 mb 0 mm/h
Thu May 22 10:00 pm
weather icon
9° | 19°°C 0 mm 0% 8 mph 59 % 1022 mb 0 mm/h
Today 1:00 pm
weather icon
13° | 15°°C 0 mm 0% 8 mph 62 % 1020 mb 0 mm/h
Today 4:00 pm
weather icon
16° | 18°°C 0 mm 0% 8 mph 49 % 1019 mb 0 mm/h
Today 7:00 pm
weather icon
16° | 16°°C 0 mm 0% 7 mph 47 % 1019 mb 0 mm/h
Today 10:00 pm
weather icon
13° | 13°°C 0 mm 0% 7 mph 64 % 1020 mb 0 mm/h
Tomorrow 1:00 am
weather icon
12° | 12°°C 0 mm 0% 7 mph 71 % 1020 mb 0 mm/h
Tomorrow 4:00 am
weather icon
9° | 9°°C 0 mm 0% 6 mph 80 % 1021 mb 0 mm/h
Tomorrow 7:00 am
weather icon
10° | 10°°C 0 mm 0% 6 mph 74 % 1021 mb 0 mm/h
Tomorrow 10:00 am
weather icon
16° | 16°°C 0 mm 0% 8 mph 55 % 1021 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€93,158.33
0.85%
Ethereum(ETH)
€2,258.30
1.74%
Tether(USDT)
€0.90
0.00%
XRP(XRP)
€2.15
1.21%
Solana(SOL)
€153.50
2.04%
USDC(USDC)
€0.90
0.00%
Dogecoin(DOGE)
€0.201238
4.22%
Shiba Inu(SHIB)
€0.000013
4.53%
Pepe(PEPE)
€0.000012
7.31%
Peanut the Squirrel(PNUT)
€0.321447
25.20%
Scroll to Top