← Back to BrewedIntel
malwarehighAd FraudMobile MalwarePhishing

Mar 18, 2025 • Alecsandru Cătălin DAJ

Hundreds of Malicious Google Play-Hosted Apps Bypassed Android 13 Security With Ease

Bitdefender researchers uncovered a massive ad fraud campaign involving hundreds of malicious applications hosted on the Google Play Store. These apps...

Source
Bitdefender Labs
Category
malware
Severity
high

Executive Summary

Bitdefender researchers uncovered a massive ad fraud campaign involving hundreds of malicious applications hosted on the Google Play Store. These apps successfully bypassed Android 13 security protections, accumulating over 60 million downloads globally. The primary objectives include generating fraudulent ad revenue and conducting phishing attacks to steal user credentials and credit card information. This campaign highlights significant risks within official app repositories, demonstrating how cybercriminals evade existing security controls to reach a vast user base. While Google actively purges identified threats, the scale of infection suggests a prolonged exposure window. Users are advised to verify app permissions, monitor bank statements for unauthorized charges, and rely on mobile security solutions. Organizations should educate employees on mobile threat vectors to prevent credential compromise. Immediate removal of suspected applications is crucial to mitigate financial loss and data theft risks associated with this widespread mobile malware distribution campaign.

Summary

Bitdefender's security researchers have identified a large-scale ad fraud campaign that deployed hundreds of malicious apps in the Google Play Store, resulting in more than 60 million downloads total. The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks. The Google Play Store is often targeted by cybercriminals trying to upload malicious apps by bypassing existing protections. Google purges the store of suc

Published Analysis

Bitdefender researchers uncovered a massive ad fraud campaign involving hundreds of malicious applications hosted on the Google Play Store. These apps successfully bypassed Android 13 security protections, accumulating over 60 million downloads globally. The primary objectives include generating fraudulent ad revenue and conducting phishing attacks to steal user credentials and credit card information. This campaign highlights significant risks within official app repositories, demonstrating how cybercriminals evade existing security controls to reach a vast user base. While Google actively purges identified threats, the scale of infection suggests a prolonged exposure window. Users are advised to verify app permissions, monitor bank statements for unauthorized charges, and rely on mobile security solutions. Organizations should educate employees on mobile threat vectors to prevent credential compromise. Immediate removal of suspected applications is crucial to mitigate financial loss and data theft risks associated with this widespread mobile malware distribution campaign. Bitdefender's security researchers have identified a large-scale ad fraud campaign that deployed hundreds of malicious apps in the Google Play Store, resulting in more than 60 million downloads total. The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks. The Google Play Store is often targeted by cybercriminals trying to upload malicious apps by bypassing existing protections. Google purges the store of suc Bitdefender's security researchers have identified a large-scale ad fraud campaign that deployed hundreds of malicious apps in the Google Play Store, resulting in more than 60 million downloads total. The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks. The Google Play Store is often targeted by cybercriminals trying to upload malicious apps by bypassing existing protections. Google purges the store of suc