Thursday, 14 September 2017

On 11:27 by admin   No comments
Developers unwittingly added the Android malware in their apps

Check Point believes that the Android app developers unwittingly distributed ExpensiveWall through their apps by using a developer kit called gtk that developers embed into their own apps. At this point, it looks like developers weren’t aware if they were including malicious behavior in their apps.
RelatedAndroid Distribution Numbers for September Show Nougat Running On 15.8% Devices
Google’s mobile operating system remains vulnerable to malware outbreak despite the company introducing several new security features. Users should remain careful about what apps they are downloading on their devices. Also ensure to have Play Protect enabled in the Google Play app from the Play Protect tab.

Users will likely remain infected even after Google’s removal of infected apps until they uninstall these apps. Check Point has shared the complete list of infected apps in today’s report (shared below). Google’s recently announced Play Protect should also be able to remove malicious apps from infected devices, but that might not happen on older versions of Android or on those where users have disabled Play Protect protection.


Post a comment