Thousands of Potentially Counterfeit Apps Found in Google Play Store

Thousands of Potentially Counterfeit Apps Found in Google Play Store

Researchers have found over 2,000 apps that are potentially counterfeits, modeled after popular app downloads. These counterfeits contain harmful malware that could harm unsuspecting users.

A recent study conducted by researchers from the University of Sydney and Commonwealth Scientific and Industrial Research Organisation’s (CSIRO) Data 61, found that Google’s Play store contains thousands of possible malware-laden counterfeit apps and games. These apps and games mimic popular alternatives, making users susceptible to downloading the wrong one. The most commonly copied games are Temple Run, Hill Climb Racing, and Free Flow.

“We were able to find 2,040 potential counterfeits that contain malware in a set of 49,608 apps that showed high similarity to one of the top-10,000 popular apps in Google Play Store,” the study stated. “We also [found] 1,565 potential counterfeits having at least five extra third-party advertisements libraries.”

From there, the apps were checked for malware using the private API of VirusTotal, and investigated further if they asked for a suspicious amount of permission.

The authors said that once the app is downloaded, it’s pretty easy to see it’s a malicious app, but it’s difficult to tell before the app is downloaded.

According to Forbes, the study found that the 2,400 most dangerous counterfeits “were marked by at least five commercial antivirus tools as malware.” Since the discovery of the apps, 27 to 46 percent of the potential counterfeits have been removed from the Google Play Store.

Laurence Pitt, the strategic security director of Juniper Networks, said that phone users need to become more educated on when they should clear their apps.

“What happens is people download them, realize it’s not what they expected, but then just leave it,” Pitt said. “People need to be better educated on application hygiene with their devices. We have so much storage available today that it’s become easy to download, install and forget. What would be helpful is a feature in the operating system that, periodically, alerts the user that installed applications that have not been used for a given period of time and makes the recommendations they could be uninstalled.”

About the Author

Kaitlyn DeHaven is the Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • New Uses for AI

    New applications of AI in IP cameras are delivering precise detection, robust search capabilities, elevated data analysis and enhanced image quality. When combined with built-in analytics, AI can help streamline forensic investigations and also supports several mission-critical business functions. Read Now

  • Global IT Outage Cause by Faulty Update from Cybersecurity Provider CrowdStrike

    Systems are starting to come back online after a global IT outage on Friday disrupted everything from airline operations to banks and 911 call centers. Read Now

  • Securing the Flow of Operations

    The transportation industry is a complex and dynamic environment where efficient management of physical keys, vehicles and shared devices is critical to ensuring smooth operations, reducing costs and maintaining security. Every day, more transportation facilities are using modern electronic key and asset management systems to better secure, audit and manage the important assets that keep operations running smoothly. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3