{"id":272109,"date":"2025-11-05T02:18:11","date_gmt":"2025-11-05T02:18:11","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/272109\/"},"modified":"2025-11-05T02:18:11","modified_gmt":"2025-11-05T02:18:11","slug":"malicious-android-apps-on-google-play-downloaded-42-million-times","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/272109\/","title":{"rendered":"Malicious Android apps on Google Play downloaded 42 million times"},"content":{"rendered":"<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" alt=\"Malicious Android apps on Google Play downloaded 42 million times\" height=\"897\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/08\/Android-2.jpg\" width=\"1600\"\/><\/p>\n<p>Hundreds of malicious Android apps on Google Play were downloaded more than 40 million times between June 2024 and May 2025, notes a report from cloud security company Zscaler.<\/p>\n<p>During the same period, the company observed a\u00a067% year-over-year growth in malware targeting mobile devices, with spyware and banking trojans being a prevalent risk.<\/p>\n<p>Telemetry data shows that threat actors are shifting from traditional card fraud to exploiting mobile payments using phishing, smishing, SIM-swapping, and payment scams.<\/p>\n<p> <a href=\"https:\/\/www.wiz.io\/lp\/ai-data-security-best-practices-cheat-sheet?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q3_INB_Form_AI-Data-Security-Best-Practices&amp;sfcid=701Py00000SmgsrIAB&amp;utm_term=FY26Q4-bleepingcomputer-970x250&amp;utm_content=AI-Data-Security-BP\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/11\/AI-Data-Security-970x250.png\" alt=\"Wiz\" style=\"margin-top: 0px;\"\/><\/a><\/p>\n<p>The transition to attacks based on social engineering is explained by the improved security standards, such as chip-and-PIN technology, and the wide adoption of mobile payments.<\/p>\n<p>&#8220;To carry out these attacks, cybercriminals deploy phishing trojans and malicious apps designed to steal financial information\u00a0and login credentials,&#8221; Zscaler says.<\/p>\n<p>According to the company, banking malware has grown significantly over the past three years, reaching 4.89 million transactions in 2025. However, the growth rate was just 3% over the observed period, down from 29% the previous year.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Blocked banking trojan transactions \" height=\"270\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/11\/transactions.jpg\" width=\"816\"\/>Blocked banking trojan transactions<br \/>Source: Zscaler<\/p>\n<p>Compared to last year, when Zscaler discovered\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/over-200-malicious-apps-on-google-play-downloaded-millions-of-times\/\" target=\"_blank\" rel=\"nofollow noopener\">200 malware apps on Google Play<\/a>, the company now reports\u00a0finding 239 malicious applications in the official Android store that collectively counted 42 million downloads.<\/p>\n<p>Another notable trend recorded during the same period is the rise of adware as the most prominent\u00a0threat in the Android ecosystem, now accounting for roughly 69% of all detections, almost double from last year.<\/p>\n<p>The Joker info-stealer, which led with 38% last year, has now dropped to second place with 23%.<\/p>\n<p>Spyware also recorded a significant rise of 220% year-over-year (YoY), with SpyNote, SpyLoan, and BadBazaar families, used for surveillance, extortion, and identity theft, being the main driving forces.<\/p>\n<p>In terms of geographic impact, India, the United States, and Canada\u00a0received 55% of all attacks. Zscaler also saw massive spikes in attacks targeting Italy and Israel, ranging from 800% to 4000% YoY increase.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Top ten most impacted countries\" height=\"536\" width=\"900\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/11\/top10.jpg\" class=\"b-lazy\"\/>Top ten most impacted countries<br \/>Source: Zscaler<\/p>\n<p>Highlighted malware<\/p>\n<p>Zscaler highlights\u00a0in its yearly report\u00a0three malware families, which had a notable impact on Android users.\u00a0The first is Anatsa, a banking trojan that <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/android-malware-anatsa-infiltrates-google-play-to-target-us-banks\/\" target=\"_blank\" rel=\"nofollow noopener\">sneaks periodically into Google Play<\/a> via productivity\/utilities apps and gets even\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malicious-android-apps-with-19m-installs-removed-from-google-play\/\" target=\"_blank\" rel=\"nofollow noopener\">hundreds of thousands of downloads<\/a> each time.<\/p>\n<p>Anatsa has been constantly evolving\u00a0since its discovery in 2020. The latest variant can steal data from over 831 financial organizations, cryptocurrency platforms, and new regions like Germany and South Korea.<\/p>\n<p>The second is <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-vo1d-malware-infects-13-million-android-streaming-boxes\/\" target=\"_blank\" rel=\"nofollow noopener\">Android Void (Vo1d)<\/a>, a backdoor malware targeting Android TV boxes, which has infected at least 1.6 million devices running outdated Android Open Source Project (AOSP) versions, primarily in India and Brazil.<\/p>\n<p>The third is Xnotice, a new Android remote access trojan (RAT) that targets job seekers in the oil &amp; gas industry, especially in Iran and Arabic-speaking regions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Xnotice attacks overview\" height=\"315\" width=\"804\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/11\/xnotice.jpg\" class=\"b-lazy\"\/>Xnotice attacks overview<br \/>Source: Zscaler<\/p>\n<p>Xnotice spreads through apps masquerading as job application or exam registration tools, which are distributed through fake employment portals.<\/p>\n<p>The malware targets banking credentials through overlays, multi-factor authentication (MFA) codes, SMS messages, and can also take screenshots.<\/p>\n<p>To defend against Android malware threats, even from Google Play, users are advised to apply security updates, only trust reputable publishers, reject\/disable Accessibility permissions, avoid downloading non-essential apps, and regularly run Play Protect scans.<\/p>\n<p>Zscaler&#8217;s report also includes trends related to IoT devices, where routers were still the most targeted this year. Hackers exploited command injection vulnerabilities to add routers to botnets or to convert them\u00a0into proxies for malware delivery.<\/p>\n<p>Most IoT attacks occurred in the U.S., followed by Hong Kong, Germany, India, and China as emerging hotbeds, an indication of attackers targeting devices across a wider geography.<\/p>\n<p>The cybersecurity company recommends organizations implement zero-trust technology for critical networks and harden IoT and cellular gateways by monitoring for anomalies and adding protections at the firmware level.<\/p>\n<p>Additionally, defenses for mobile endpoints should include checking SIM-level traffic for irregularities, protection against phishing attacks, and strict application control policies.<\/p>\n<p>        <a href=\"https:\/\/www.wiz.io\/lp\/model-context-protocol-mcp-security-best-practices-cheat-sheet?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q3_INB_FORM_MCP-Best%20Practices-Cheat-Sheet&amp;sfcid=701Py00000TCZuBIAX&amp;utm_term=FY26Q4-bleepingcomputer-article-ad&amp;utm_content=MCP-Best-Practices\" target=\"_blank\" rel=\"noopener sponsored nofollow\"><br \/>\n            <img decoding=\"async\" alt=\"Wiz\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/11\/MCP-Best-Practices-512x512.png\" class=\"b-lazy\"\/><\/a><\/p>\n<p>As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.<\/p>\n<p>This free cheat sheet outlines 7 best practices you can start using today.<\/p>\n<p>        <a href=\"https:\/\/www.wiz.io\/lp\/model-context-protocol-mcp-security-best-practices-cheat-sheet?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q3_INB_FORM_MCP-Best%20Practices-Cheat-Sheet&amp;sfcid=701Py00000TCZuBIAX&amp;utm_term=FY26Q4-bleepingcomputer-article-ad&amp;utm_content=MCP-Best-Practices\" target=\"_blank\" rel=\"noopener sponsored nofollow\">Download Now<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Hundreds of malicious Android apps on Google Play were downloaded more than 40 million times between June 2024&hellip;\n","protected":false},"author":2,"featured_media":109430,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[41],"tags":[165,74],"class_list":{"0":"post-272109","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-mobile","8":"tag-mobile","9":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/272109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=272109"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/272109\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/109430"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=272109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=272109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=272109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}