Google removed 200 adware-infected apps from the Play Store

We all know that Google does not leave any stones unturned when it comes to taking security measures for protecting the apps which are published on the Play Store. However, recently, a team of researchers conducting security test activities found a new kind of adware named SimBad. This adware affected more than 200 Android applications, most of them being simulator games. Combined together, the apps had over 150 million downloads.

What did the researchers find out?

Researchers at Check Point found out about this adware. They have stated that an entity named addroider released an ad-related SDK. SimBad was enclosed within it. Without knowing any details about the content, many developers were tempted and wanted to use the platform badly. Once the app was installed, the adware connected itself to the control and command services and started taking further actions.

It also directed the users to visit websites containing scam content or install a rogue mobile application. The biggest threat is the fact that SimBad can evolve itself. If left unchecked, with time, it gets converted into something big and impossible to control.

What action was taken?

The infected apps were accused of phishing, unnecessarily showing ads and exposing the users to other suspected applications. Researchers reported to Google about the apps which were infected with Simbad. Without any delay, Google removed the reported applications from the Play Store. However, Check Point notified that SimBad already has developed the infrastructure where it can evolve.

What did Google say?

Google’s App Review process is not that much strict when compared to the App Store by Apple. Hence, malicious apps do not have that much problem to infiltrate the Play Store and infect the apps. Although Google said that they are improving their security systems to keep malicious apps and adware in check, still, the count is rising day by day.

Last month, Google said that in 2018, they got rid of the malicious activities in almost 75,000 apps. The count is 70% higher than in 2016. Even before certain harmful apps were downloaded and installed, Google removed 99% of them.

However, as per Dave Kleidermacher, head of security and vice president of the Play Store, nothing is perfect and sometimes vulnerabilities occur. Still, they take these incidents in an extremely serious manner and they will keep on working to improve the scanning and filtering of suspicious apps and people working behind them.

Checkpoint also stated that not only on apps, but this kind of adware can hide behind an SDK as well. They found one such malware hidden behind an SDK that infected about 111 million devices and started stealing contact information from them in China.

What can be done from our end?

Well, first of all, users need to be aware before downloading or installing any application. If you see a new, interesting application on the Play Store, don’t download it if it doesn’t have any reviews yet, and also, use caution if you download APK files from Android market places other than the Google Play Store.

Developers, on the other hand, must be a step ahead. Before integrating any SDK in their developed application, they should be aware of the risk posed by undocumented malware in a third-party SDK.

Note: This is a guest post. You’ll never find our opinions in them.

Are you interested in doing a guest or sponsored post or advertising in some other fashion on our site? Fill out this form!